INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:83236000 r4:83236000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84947640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af7b8c r4:84af7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af7b8c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a9acb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:3:112 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:112 tgid:112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:833be000 r4:833be000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833be000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3db8c r4:85e3d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3db8c r4:839cbf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833be000 r8:839cbf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:839cbf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:839cbf00 r8:8027f5e8 r7:df841e60 r6:839cbf80 r5:833be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83b03e00 INFO: task kworker/0:3:112 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa076000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:2:1463 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:1463 tgid:1463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:83b89800 r4:83b89800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b89800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552378c r4:85523400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552378c r4:84192080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b89800 r8:841920ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84192080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84192080 r8:8027f5e8 r7:df879e60 r6:84192100 r5:83b89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84190b40 INFO: task kworker/1:2:1463 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa076000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:3:1786 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:1786 tgid:1786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:83b7d400 r4:83b7d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b7d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac35000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556238c r4:85562000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556238c r4:84268700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b7d400 r8:8426872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84268700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84268700 r8:8027f5e8 r7:df879e60 r6:84268780 r5:83b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84190e00 INFO: task kworker/1:3:1786 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa076000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:1:3095 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df925d84 r8:00000002 r7:60000013 r6:df925d8c r5:83b8c800 r4:83b8c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b8c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df925e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed205000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3df8c r4:85e3dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3df8c r4:843d7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b8c800 r8:843d702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7000 r8:8027f5e8 r7:df83de60 r6:843d7300 r5:83b8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf925fb0 to 0xdf925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f480 INFO: task kworker/0:1:3095 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa643000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:1:3110 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:84206c00 r4:84206c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84206c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84206c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85521b8c r4:85521800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85521b8c r4:8490b780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84206c00 r8:8490b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490b780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490b780 r8:8027f5e8 r7:eac79e60 r6:8490b700 r5:84206c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84925000 INFO: task kworker/1:1:3110 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa643000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:6:3118 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84203c00 r4:84203c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84203c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851275c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84203c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85119b8c r4:85119800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85119b8c r4:843d7500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84203c00 r8:843d752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7500 r8:8027f5e8 r7:df83de60 r6:8490ba00 r5:84203c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490ff40 INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aabca000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:7:3119 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:84202400 r4:84202400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84202400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b348c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84202400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0a38c r4:84b0a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0a38c r4:843d7580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84202400 r8:843d75ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7580 r8:8027f5e8 r7:df9f5e60 r6:8490ba80 r5:84202400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490fdc0 INFO: task kworker/0:7:3119 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aabca000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:8:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:84200000 r4:84200000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84200000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd1380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84200000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0bf8c r4:84b0bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0bf8c r4:843d7600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84200000 r8:843d762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7600 r8:8027f5e8 r7:df9f5e60 r6:8490bc80 r5:84200000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bdc00 INFO: task kworker/0:8:3122 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aabca000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:9:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:83b8a400 r4:83b8a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b8a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3b00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3138c r4:84b31000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3138c r4:843d7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b8a400 r8:843d76ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7680 r8:8027f5e8 r7:df9f5e60 r6:843d7700 r5:83b8a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f080 INFO: task kworker/0:9:3123 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab12a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83b8e000 r4:83b8e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b8e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b32b8c r4:84b32800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b32b8c r4:843d7780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b8e000 r8:843d77ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7780 r8:8027f5e8 r7:df9f5e60 r6:843d7800 r5:83b8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f240 INFO: task kworker/0:10:3125 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab12a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:83a0a400 r4:83a0a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a0a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3278c r4:84b32400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3278c r4:843d7880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0a400 r8:843d78ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7880 r8:8027f5e8 r7:df9f5e60 r6:843d7900 r5:83a0a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f340 INFO: task kworker/0:11:3128 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab44c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83af2400 r4:83af2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512db80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b33f8c r4:84b33c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b33f8c r4:843d7980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af2400 r8:843d79ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7980 r8:8027f5e8 r7:df9f5e60 r6:843d7a00 r5:83af2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f3c0 INFO: task kworker/0:12:3130 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab44c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df965d84 r8:00000002 r7:60000113 r6:df965d8c r5:83af3000 r4:83af3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df965e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513b480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af3000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0029000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e138c r4:845e1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e138c r4:843d7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af3000 r8:843d7aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7a80 r8:8027f5e8 r7:dfa31e60 r6:843d7b00 r5:83af3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf965fb0 to 0xdf965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f3c0 INFO: task kworker/0:13:3131 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab825000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:833a6000 r4:833a6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e178c r4:845e1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e178c r4:843d7b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a6000 r8:843d7bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7b80 r8:8027f5e8 r7:df965e60 r6:843d7c00 r5:833a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f740 INFO: task kworker/0:14:3134 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab8de000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3136 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa65d84 r8:00000002 r7:60000013 r6:dfa65d8c r5:833a2400 r4:833a2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849146c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502938c r4:85029000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502938c r4:843d7c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a2400 r8:843d7cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7c80 r8:8027f5e8 r7:dfa49e60 r6:843d7d00 r5:833a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f900 INFO: task kworker/0:15:3136 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab8de000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3138 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:833a0000 r4:833a0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526d38c r4:8526d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526d38c r4:843d7d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a0000 r8:843d7dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7d80 r8:8027f5e8 r7:dfa65e60 r6:843d7e00 r5:833a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492fb40 INFO: task kworker/0:16:3138 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abc0b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:833a5400 r4:833a5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524338c r4:85243000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524338c r4:843d7e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a5400 r8:843d7eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7e80 r8:8027f5e8 r7:dfa75e60 r6:843d7f00 r5:833a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492fb80 INFO: task kworker/0:17:3140 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abc0b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83236c00 r4:83236c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524278c r4:85242400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524278c r4:843d7f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236c00 r8:843d7fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7f80 r8:8027f5e8 r7:dfa81e60 r6:843d7200 r5:83236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492fd00 INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abeed000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:84208c00 r4:84208c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84208c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b92c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84208c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e238c r4:845e2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e238c r4:843d7080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84208c00 r8:843d70ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7080 r8:8027f5e8 r7:dfa81e60 r6:843d7100 r5:84208c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945080 INFO: task kworker/0:19:3144 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abeed000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:8420c800 r4:8420c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8420c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9a480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8420c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85380b8c r4:85380800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85380b8c r4:843d7380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8420c800 r8:843d73ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7380 r8:8027f5e8 r7:dfaa5e60 r6:83363700 r5:8420c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945080 INFO: task kworker/0:20:3145 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abeed000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:8420e000 r4:8420e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8420e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8420e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85382f8c r4:85382c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85382f8c r4:83363680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8420e000 r8:833636ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83363680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027f5e8 r7:dfa5de60 r6:84589880 r5:8420e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945200 INFO: task kworker/0:21:3148 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac3a7000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83244800 r4:83244800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83244800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9aec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83244800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538178c r4:85381400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538178c r4:84589900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83244800 r8:8458992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84589900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84589900 r8:8027f5e8 r7:dfabde60 r6:830b8600 r5:83244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849452c0 INFO: task kworker/0:22:3150 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac572000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83242400 r4:83242400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85329640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83242400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb499000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85383f8c r4:85383c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85383f8c r4:830b8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830b852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027f5e8 r7:dfabde60 r6:83fa2980 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945680 INFO: task kworker/0:23:3152 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac572000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8420bc00 r4:8420bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8420bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85329180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8420bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea869000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e3f8c r4:845e3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e3f8c r4:830cd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8420bc00 r8:830cd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027f5e8 r7:dfab1e60 r6:830cd080 r5:8420bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849457c0 INFO: task kworker/0:24:3154 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac968000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3156 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaf1d84 r8:00000002 r7:60000013 r6:dfaf1d8c r5:84203000 r4:84203000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84203000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84203000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497038c r4:84970000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497038c r4:830cd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84203000 r8:830cd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd400 r8:8027f5e8 r7:dfad5e60 r6:8490b180 r5:84203000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945900 INFO: task kworker/0:25:3156 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac968000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:84205400 r4:84205400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84205400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85716540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84205400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb989000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567c78c r4:8567c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567c78c r4:830cd380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84205400 r8:830cd3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd380 r8:8027f5e8 r7:dfaf1e60 r6:8490bd80 r5:84205400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945a00 INFO: task kworker/0:26:3158 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: acb4c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb09d84 r8:00000002 r7:60000013 r6:dfb09d8c r5:833b6000 r4:833b6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833b6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497078c r4:84970400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497078c r4:832a1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833b6000 r8:832a12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1280 r8:8027f5e8 r7:dfafde60 r6:8490b080 r5:833b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945cc0 INFO: task kworker/0:27:3160 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: acb4c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3165 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83ba1800 r4:83ba1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717140 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb983000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f5b8c r4:841f5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f5b8c r4:8490bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba1800 r8:8490bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490bf00 r8:8027f5e8 r7:eac79e60 r6:8490b880 r5:83ba1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19100 INFO: task kworker/1:4:3165 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ace6b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3166 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83ba3c00 r4:83ba3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f7f8c r4:841f7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f7f8c r4:8490b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba3c00 r8:8490b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490b980 r8:8027f5e8 r7:dfb15e60 r6:8490b480 r5:83ba3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19100 INFO: task kworker/1:5:3166 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ace6b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3170 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83ba5400 r4:83ba5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573a240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba5400 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc78c r4:855fc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fc78c r4:8490bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba5400 r8:8490bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490bf80 r8:8027f5e8 r7:dfb15e60 r6:8490b300 r5:83ba5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19480 INFO: task kworker/1:6:3170 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad1f8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3171 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:83b99800 r4:83b99800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b99800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85948600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b99800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec39f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d4b8c r4:858d4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d4b8c r4:84458b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b99800 r8:84458bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84458b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84458b80 r8:8027f5e8 r7:dfb39e60 r6:83f8b380 r5:83b99800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a196c0 INFO: task kworker/1:7:3171 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad1f8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83adc800 r4:83adc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83adc800 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567eb8c r4:8567e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567eb8c r4:832a1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adc800 r8:832a122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1200 r8:8027f5e8 r7:dfafde60 r6:8336bf00 r5:83adc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945f80 INFO: task kworker/0:28:3173 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad473000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83ad9800 r4:83ad9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3d38c r4:85e3d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3d38c r4:8336be80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad9800 r8:8336beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8336be80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8336be80 r8:8027f5e8 r7:dfae1e60 r6:8336b980 r5:83ad9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945f80 INFO: task kworker/0:29:3174 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad7dc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:84212400 r4:84212400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84212400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ce80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84212400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578ab8c r4:8578a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578ab8c r4:848cbf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84212400 r8:848cbfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cbf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cbf80 r8:8027f5e8 r7:dfb45e60 r6:8336b900 r5:84212400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a193c0 INFO: task kworker/1:8:3176 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad7dc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb65d84 r8:00000002 r7:60000013 r6:dfb65d8c r5:84830c00 r4:84830c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585ba80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bb8c r4:8578b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578bb8c r4:848cba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:848cbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cba80 r8:8027f5e8 r7:dfb45e60 r6:83358300 r5:84830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19900 INFO: task kworker/1:9:3178 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adf46000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84830000 r4:84830000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c68c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84830000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d4f8c r4:858d4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d4f8c r4:84a18000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:84a1802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18000 r8:8027f5e8 r7:dfb45e60 r6:83358000 r5:84830000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19a00 INFO: task kworker/1:10:3181 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adf46000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b9b000 r4:83b9b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fbb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d578c r4:858d5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d578c r4:84a18080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9b000 r8:84a180ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18080 r8:8027f5e8 r7:dfb81e60 r6:84a18100 r5:83b9b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19bc0 INFO: task kworker/1:11:3183 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adf46000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83b9d400 r4:83b9d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fba40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb451000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d538c r4:858d5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d538c r4:84a18180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9d400 r8:84a181ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18180 r8:8027f5e8 r7:dfb2de60 r6:84a18200 r5:83b9d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19bc0 INFO: task kworker/1:12:3184 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ae1c8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83b9c800 r4:83b9c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a20d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec905000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d738c r4:858d7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d738c r4:84a18280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9c800 r8:84a182ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18280 r8:8027f5e8 r7:dfb61e60 r6:84a18300 r5:83b9c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944000 INFO: task kworker/1:13:3187 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ae1c8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83b9bc00 r4:83b9bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae4d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed127000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af8f8c r4:85af8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af8f8c r4:84a18380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9bc00 r8:84a183ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18380 r8:8027f5e8 r7:dfb8de60 r6:84a18400 r5:83b9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944000 INFO: task kworker/1:14:3188 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb5e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:83ba6000 r4:83ba6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ace040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb239000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8b8c r4:841f8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f8b8c r4:84a18480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba6000 r8:84a184ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18480 r8:8027f5e8 r7:dfb99e60 r6:84a18500 r5:83ba6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944000 INFO: task kworker/1:15:3189 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb5e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84833000 r4:84833000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84833000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc8c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bf178c r4:85bf1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf178c r4:84940000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:8494002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84940000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84940000 r8:8027f5e8 r7:dfb49e60 r6:84940080 r5:84833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84941980 INFO: task kworker/0:30:3191 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb5e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83afbc00 r4:83afbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83afbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae4a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83afbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb937000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af978c r4:85af9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af978c r4:84a18580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83afbc00 r8:84a185ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18580 r8:8027f5e8 r7:dfb99e60 r6:84a18600 r5:83afbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849442c0 INFO: task kworker/1:16:3193 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:83af8c00 r4:83af8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae6480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdfb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af9b8c r4:85af9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af9b8c r4:84a18680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af8c00 r8:84a186ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18680 r8:8027f5e8 r7:dfba5e60 r6:84a18700 r5:83af8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944340 INFO: task kworker/1:17:3194 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83afd400 r4:83afd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83afd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae6980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83afd400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afa38c r4:85afa000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afa38c r4:84a18780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83afd400 r8:84a187ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18780 r8:8027f5e8 r7:dfbc9e60 r6:84a18800 r5:83afd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944340 INFO: task kworker/1:18:3196 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbd9d84 r8:00000002 r7:60000013 r6:dfbd9d8c r5:83ba2400 r4:83ba2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae6580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af9f8c r4:85af9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af9f8c r4:84a18880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba2400 r8:84a188ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18880 r8:8027f5e8 r7:dfbcde60 r6:84a18900 r5:83ba2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849442c0 INFO: task kworker/1:19:3199 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:83af9800 r4:83af9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b4e740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83af9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed28d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa3f8c r4:85aa3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa3f8c r4:84a18980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af9800 r8:84a189ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18980 r8:8027f5e8 r7:dfbcde60 r6:84a18a00 r5:83af9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944bc0 INFO: task kworker/1:20:3203 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af52c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84834800 r4:84834800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84834800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849443c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84834800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afa78c r4:85afa400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afa78c r4:84a18a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84834800 r8:84a18aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18a80 r8:8027f5e8 r7:dfbede60 r6:84940100 r5:84834800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944c80 INFO: task kworker/1:21:3204 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af52c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc21d84 r8:00000002 r7:60000013 r6:dfc21d8c r5:84836000 r4:84836000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84836000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b52b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84836000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed299000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa838c r4:85aa8000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa838c r4:84a18b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836000 r8:84a18b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18b00 r8:8027f5e8 r7:dfc05e60 r6:84940180 r5:84836000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19700 INFO: task kworker/1:22:3207 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: afeef000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbaf80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84831800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec307000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afaf8c r4:85afac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afaf8c r4:84a18b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:84a18bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18b80 r8:8027f5e8 r7:dfc05e60 r6:84940200 r5:84831800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84944f40 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:24:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:83afe000 r4:83afe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83afe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbad00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dfbbf000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:25:3212 blocked for more than 451 seconds. r5:84840000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec431000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afb38c r4:85afb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afb38c r4:84a18d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84840000 r8:84a18d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18d00 r8:8027f5e8 r7:dfc25e60 r6:84a18d80 r5:84840000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938080 INFO: task kworker/1:25:3212 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0302000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Exception stack(0xe055dfb0 to 0xe055dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84840c00 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec4e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85afb78c r4:84a18e00 Exception stack(0xdfc3dfb0 to 0xdfc3dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:84841800 r4:84841800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84841800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf0c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84841800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec919000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f978c r4:841f9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f978c r4:84a18f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84841800 r8:84a18f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18f00 r8:8027f5e8 r7:dfc3de60 r6:84a18f80 r5:84841800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938180 INFO: task kworker/1:27:3216 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b04bb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r9:83018205 r8:84833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:00001000 r4:ec5a1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0a1f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84836c00 r4:84836c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84836c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3d78c r4:85e3d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3d78c r4:84940380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836c00 r8:849403ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84940380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84940380 r8:8027f5e8 r7:dfb49e60 r6:84940400 r5:84836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: b0a1f000 dfe07000 00000001 80239b98 7f7af000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84832400 r4:84832400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84832400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae4c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84832400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afbf8c r4:85afbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afbf8c r4:84931080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:849310ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931080 r8:8027f5e8 r7:dfbb1e60 r6:84940580 r5:84832400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938700 INFO: task kworker/1:29:3223 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc8dd84 r8:00000002 r7:60000113 r6:dfc8dd8c r5:849d0000 r4:849d0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f938c r4:841f9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f938c r4:84931100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0000 r8:8493112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931100 r8:8027f5e8 r7:dfbb1e60 r6:84940600 r5:849d0000 Exception stack(0xdfc8dfb0 to 0xdfc8dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:31:3227 blocked for more than 451 seconds. r5:849d0c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecbb7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred dd20: b0f43000 dfe07000 00000001 80239b98 7f7af000 00000001 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecc21000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1078c r4:85b10400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1078c r4:84931280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d1800 r8:849312ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931280 r8:8027f5e8 r7:dfc91e60 r6:84940700 r5:849d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938c00 INFO: task kworker/1:32:3231 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b14e0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:849d2400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfe80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12b8c r4:85b12800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b12b8c r4:84931300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d2400 r8:8493132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931300 r8:8027f5e8 r7:dfcc1e60 r6:84940780 r5:849d2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:849d4800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf600 r5:00001000 r4:ecddd000 r7:ddde2d80 r6:83018200 r5:85b10b8c r4:84931380 Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3236 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:849d3000 r4:849d3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b10f8c r4:85b10c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b10f8c r4:84931400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d3000 r8:8493142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931400 r8:8027f5e8 r7:dfcc9e60 r6:84940880 r5:849d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938d00 INFO: task kworker/1:35:3236 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1a3a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecfb5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938e80 INFO: task kworker/1:36:3237 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1e55000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:849d6c00 r4:849d6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfd00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfcb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1278c r4:85b12400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1278c r4:84931500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d6c00 r8:8493152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931500 r8:8027f5e8 r7:dfce1e60 r6:84940980 r5:849d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a0c0 INFO: task kworker/1:37:3240 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2368000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3241 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:849d5400 r4:849d5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed18f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b13f8c r4:85b13c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b13f8c r4:84931580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d5400 r8:849315ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931580 r8:8027f5e8 r7:dfce1e60 r6:84940a00 r5:849d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a0c0 INFO: task kworker/1:38:3241 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2368000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:845d0c00 r4:845d0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b11f8c r4:85b11c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b11f8c r4:84931600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d0c00 r8:8493162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931600 r8:8027f5e8 r7:dfd05e60 r6:84940a80 r5:845d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a280 INFO: task kworker/1:39:3243 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2786000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3245 blocked for more than 451 seconds. Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecf7b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred dd20: b2786000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:845d3000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcff80 r5:00001000 r4:ecff3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84931700 r8:8027f5e8 r7:dfd05e60 r6:84940b80 r5:845d3000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85b1338c r4:84931780 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84843c00 r4:84843c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84843c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bba740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1378c r4:85b13400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1378c r4:84931800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84843c00 r8:8493182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931800 r8:8027f5e8 r7:dfd05e60 r6:84931880 r5:84843c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a700 INFO: task kworker/1:43:3251 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3047000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:84845400 r4:00000000 r4:00000000 r5:00001000 r4:ed033000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3256 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:845d3c00 r4:845d3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b15b8c r4:85b15800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b15b8c r4:84931a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d3c00 r8:84931a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931a00 r8:8027f5e8 r7:dfd05e60 r6:84940c80 r5:845d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492ab80 INFO: task kworker/1:45:3256 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:845d5400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed19d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1438c r4:85b14000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1438c r4:84931a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d5400 r8:84931aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931a80 r8:8027f5e8 r7:dfa1de60 r6:84940d00 r5:845d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492ac80 INFO: task kworker/1:46:3257 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b34b1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:845d6000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed1ab000 r5:85b1478c r4:85b14400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:48:3262 blocked for more than 451 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b14b8c r4:85b14800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b14b8c r4:84931b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d6c00 r8:84931bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931b80 r8:8027f5e8 r7:dfa1de60 r6:84940e00 r5:845d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938840 INFO: task kworker/1:48:3262 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3d3c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:845d2400 r4:845d2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b14f8c r4:85b14c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b14f8c r4:84931c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d2400 r8:84931c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931c00 r8:8027f5e8 r7:dfa1de60 r6:84940e80 r5:845d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8492ac80 r4:00000000 dd20: b4172000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r5:00001000 r4:ed1db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:51 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed1eb000 r7:ddde2d80 r6:83018200 r5:85b1578c r4:84931d00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3269 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84801800 r4:84801800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84801800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84801800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed211000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b15f8c r4:85b15c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b15f8c r4:84931d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84801800 r8:84931dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931d80 r8:8027f5e8 r7:dfa1de60 r6:846f7000 r5:84801800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3274 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:84803000 r4:84803000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84803000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84803000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r5:00001000 r4:ed231000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85b1678c r4:84931e00 Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84803c00 r4:8291892c r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:848f5380 Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b47e0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3278 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84804800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed257000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b16f8c r4:85b16c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b16f8c r4:84931f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84804800 r8:84931f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931f00 r8:8027f5e8 r7:dfaf9e60 r6:846f7280 r5:84804800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd2dfb0 to 0xdfd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f5800 INFO: task kworker/1:55:3278 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b4df0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84805400 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ed23f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85b16b8c r4:84931f80 r4:84931f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r4:84a53d80 r4:00000001 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85baa040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84806000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed287000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b17b8c r4:85b17800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b17b8c r4:8491b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84806000 r8:8491b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b000 r8:8027f5e8 r7:dfd2de60 r6:846f7380 r5:84806000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd45fb0 to 0xdfd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f5840 INFO: task kworker/1:57:3282 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b50d4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 r5:00001000 r4:ed265000 r7:ddde2d80 r6:83018200 r5:85b1738c r4:8491b080 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3286 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:845d4800 r4:845d4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcff00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed273000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1778c r4:85b17400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1778c r4:8491b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d4800 r8:8491b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b100 r8:8027f5e8 r7:dfd45e60 r6:846f7480 r5:845d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f5c80 INFO: task kworker/1:59:3286 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: b5714000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:60 state:D stack:0 pid:3294 tgid:3294 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2af000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8491b180 r8:8027f5e8 r7:dfd45e60 r6:846f7500 r5:84981800 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:84846000 r4:84846000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84846000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85baa300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84846000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed295000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b17f8c r4:85b17c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b17f8c r4:8491b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84846000 r8:8491b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b200 r8:8027f5e8 r7:dfb89e60 r6:8491b280 r5:84846000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f9b100 INFO: task kworker/1:61:3295 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: b5cc7000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:84844800 r4:84844800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84844800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85baa440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1838c r4:85b18000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1838c r4:8491b300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84844800 r8:8491b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b300 r8:8027f5e8 r7:dfb89e60 r6:8491b380 r5:84844800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f9b100 INFO: task kworker/1:62:3296 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b5cc7000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r4:84843000 r4:00000000 r4:00000000 r5:00001000 r4:ed387000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b18b8c r4:85b18800 r4:8491b400 Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f9b100 INFO: task kworker/1:63:3297 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b60fd000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3598 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84766c00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b34040 r5:00001000 r4:e06a9000 r5:84b09b8c r4:84b09800 r10:61c88647 r9:84766c00 r8:84a9d8ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:3671 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:3671 tgid:3671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:84abe000 r4:84abe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84abe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abe000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af138c r4:84af1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af138c r4:84a53e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abe000 r8:84a53eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53e80 r8:8027f5e8 r7:e055de60 r6:84a53f00 r5:84abe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:206:3671 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6849000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ab0000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e03d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84ab0000 r8:84a53fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:207:3672 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6849000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3674 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0549d84 r8:00000002 r7:60000113 r6:e0549d8c r5:847bbc00 r4:847bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e06a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0978c r4:84a4a500 Exception stack(0xe0549fb0 to 0xe0549ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3676 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3676 tgid:3676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e056dd84 r8:00000002 r7:60000013 r6:e056dd8c r5:847bd400 r4:847bd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e056de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af178c r4:84af1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af178c r4:84a43080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bd400 r8:84a430ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43080 r8:8027f5e8 r7:e0561e60 r6:84a4a600 r5:847bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe056dfb0 to 0xe056dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51480 INFO: task kworker/1:208:3676 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6efa000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:e0405000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a43100 r8:8027f5e8 r7:e056de60 r6:84a4a680 r5:847be000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:3681 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:847bec00 r4:847bec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e05c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af3f8c r4:84af3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af3f8c r4:84a43180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bec00 r8:84a431ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43180 r8:8027f5e8 r7:e057de60 r6:84a4a700 r5:847bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51b00 INFO: task kworker/1:210:3681 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:80000013 r4:80239bb0 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af1f8c r4:84af1c00 r4:84a43200 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7323000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3684 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84759800 r4:84759800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84759800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84759800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af238c r4:84af2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af238c r4:84a43280 r4:84a43280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:3686 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:3686 tgid:3686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0595d84 r8:00000002 r7:60000013 r6:e0595d8c r5:84758c00 r4:84758c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84758c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08 r4:00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e043f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af278c r4:84af2400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af278c r4:84a43300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84758c00 r8:84a4332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43300 r8:8027f5e8 r7:e0581e60 r6:84a4a880 r5:84758c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51980 INFO: task kworker/1:213:3686 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:214 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08 r5:00001000 r4:e048b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8475a400 r8:84a433ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:215:3690 blocked for more than 452 seconds. r4:8475c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8475c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af2f8c r4:84af2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af2f8c r4:84a43400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475c800 r8:84a4342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43400 r8:8027f5e8 r7:e0581e60 r6:84a4a980 r5:8475c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a5fb0 to 0xe05a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a17d00 INFO: task kworker/1:215:3690 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7878000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:3692 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018205 r8:8475bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 r5:00001000 r4:e04c3000 r5:84af338c r4:84af3000 r10:61c88647 r9:8475bc00 r8:84a434ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:217:3694 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e05b5d84 r8:00000002 r7:60000013 r6:e05b5d8c r5:8475b000 r4:8475b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8475b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8475b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af378c r4:84af3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af378c r4:84a43500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475b000 r8:84a4352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43500 r8:8027f5e8 r7:e0581e60 r6:84a4aa80 r5:8475b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2b080 INFO: task kworker/1:217:3694 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b830b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e03b1000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r9:83018205 r8:8475d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r5:00001000 r4:e0509000 r7:ddde2d80 r6:83018200 r5:84af3b8c r4:84a43580 Exception stack(0xe05bdfb0 to 0xe05bdff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df993000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af4b8c r4:84af4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af4b8c r4:84a43600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475e000 r8:84a4362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43600 r8:8027f5e8 r7:e0581e60 r6:84a4ab80 r5:8475e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d5fb0 to 0xe05d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2b1c0 INFO: task kworker/1:219:3698 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b862f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84968000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e05d1000 r5:84af438c r4:84af4000 r4:84a43680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b862f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:3702 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe6dd84 r8:00000002 r7:60000013 r6:dfe6dd8c r5:84969800 r4:84969800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84969800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe6de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df961000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af478c r4:84af4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af478c r4:84a43700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84969800 r8:84a4372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43700 r8:8027f5e8 r7:e05d5e60 r6:84a4ac80 r5:84969800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe6dfb0 to 0xdfe6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2b240 INFO: task kworker/1:221:3702 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:222 state:D stack:0 pid:3704 tgid:3704 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff89e08 r5:00001000 r4:dfa41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84af578c r4:84a43780 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: b8b37000 dfe07000 00000001 80239b98 7f7af000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df9d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:3709 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:3709 tgid:3709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e05fdd84 r8:00000002 r7:60000113 r6:e05fdd8c r5:84968c00 r4:84968c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84968c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ba80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af538c r4:84af5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af538c r4:84a43880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968c00 r8:84a438ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43880 r8:8027f5e8 r7:dff89e60 r6:84a4ae00 r5:84968c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84af0b8c r4:84af0800 r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84ab2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2be00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af5f8c r4:84af5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af5f8c r4:84a43a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab2400 r8:84a43a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43a00 r8:8027f5e8 r7:e0569e60 r6:84a43a80 r5:84ab2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0571fb0 to 0xe0571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2bb40 INFO: task kworker/1:226:3713 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b9113000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918930 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:84ab3000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfb0d000 r7:ddde2d80 r6:83018200 r5:84af638c r4:84a43b00 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3717 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3717 tgid:3717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0605d84 r8:00000002 r7:60000013 r6:e0605d8c r5:84ab3c00 r4:84ab3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ab3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f880 r5:00001000 r4:dfd29000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a2be40 Call trace: dd20: b9a5d000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 task:kworker/1:229 state:D stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r5:00001000 r4:dfd55000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84af6b8c r4:84942180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab4800 r8:849421ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942180 r8:8027f5e8 r7:e0605e60 r6:84942200 r5:84ab4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a4df40 INFO: task kworker/1:229:3720 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b9cff000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84ab5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08 r5:00001000 r4:dfe37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84af6f8c r4:84942280 Exception stack(0xe0619fb0 to 0xe0619ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfe65000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0611fb0 to 0xe0611ff8) Workqueue: events bpf_prog_free_deferred dd20: b9fdf000 dfe07000 00000001 80239b98 7f7af000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:3725 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0621d84 r8:00000002 r7:60000013 r6:e0621d8c r5:84ab1800 r4:84ab1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ab1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492b300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ab1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af738c r4:84af7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af738c r4:84942480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab1800 r8:849424ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942480 r8:8027f5e8 r7:e0611e60 r6:84942500 r5:84ab1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0621fb0 to 0xe0621ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:84ac0000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfef9000 r7:ddde2d80 r6:83018200 r5:84afc38c r4:84942580 Exception stack(0xe0625fb0 to 0xe0625ff8) Workqueue: events bpf_prog_free_deferred dd20: ba455000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r4:84ac1800 r5:84ac1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492bb00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ac1800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af7f8c r4:84af7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af7f8c r4:84942680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac1800 r8:849426ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942680 r8:8027f5e8 r7:e0625e60 r6:84942700 r5:84ac1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492b200 INFO: task kworker/1:234:3729 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ba9f6000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r4:00000001 r4:84a51100 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:3733 tgid:3733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0629d84 r8:00000002 r7:60000113 r6:e0629d8c r5:84ac2400 r4:84ac2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492bd00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ac2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afc78c r4:84afc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afc78c r4:84942780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac2400 r8:849427ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942780 r8:8027f5e8 r7:e0625e60 r6:84942800 r5:84ac2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0629fb0 to 0xe0629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afcb8c r4:84afc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afcb8c r4:84942880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3000 r8:849428ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942880 r8:8027f5e8 r7:e0629e60 r6:84942900 r5:84ac3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492bb80 INFO: task kworker/1:236:3734 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bacd5000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afcf8c r4:84afcc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afcf8c r4:84942980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac4800 r8:849429ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942980 r8:8027f5e8 r7:e0631e60 r6:84942a00 r5:84ac4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe061dfb0 to 0xe061dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492bf00 INFO: task kworker/1:237:3736 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ac5400 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dff85000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb07b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:3740 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:8496ec00 r4:8496ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926380 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84afd78c r4:84942b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:84a53d80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e064dd84 r8:00000002 r7:60000013 r6:e064dd8c r5:8496d400 r4:8496d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afdb8c r4:84afd800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afdb8c r4:84942c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496d400 r8:84942c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942c00 r8:8027f5e8 r7:e063de60 r6:84a4af00 r5:8496d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84926200 INFO: task kworker/1:240:3742 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb397000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r5:00001000 r4:dffe5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8496e000 r8:84942cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84926280 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:8496bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08 r5:00001000 r4:e0361000 r5:84afef8c r4:84afec00 r7:ddde2d80 r6:83018200 r5:84afef8c r4:84942d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496bc00 r8:84942d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942d00 r8:8027f5e8 r7:e0655e60 r6:84a43d00 r5:8496bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe065dfb0 to 0xe065dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84926440 INFO: task kworker/1:242:3746 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb70d000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:3747 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:3747 tgid:3747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0665d84 r8:00000002 r7:60000113 r6:e0665d8c r5:8475ec00 r4:8475ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8475ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0665e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8475ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84926440 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:244:3749 blocked for more than 452 seconds. r10:82918930 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:8496c800 r5:8496c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0027000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afe78c r4:84afe400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afe78c r4:84942e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:84942e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942e00 r8:8027f5e8 r7:e065de60 r6:84a43e00 r5:8496c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84926580 INFO: task kworker/1:244:3749 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r5:00001000 r4:e03b1000 r4:84a53d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b40c00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84afeb8c r4:84afe800 r4:00000001 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:3754 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0679d84 r8:00000002 r7:60000113 r6:e0679d8c r5:84b40000 r4:84b40000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b40000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926c80 r9:83018205 r8:84b40000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r5:00001000 r4:e0385000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aff38c r4:84aff000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84942f00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: bc375000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:3755 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:84b42400 r4:84b42400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b42400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b42400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0685000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84affb8c r4:84aff800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84affb8c r4:84942f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b42400 r8:84942fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942f80 r8:8027f5e8 r7:e0679e60 r6:84a43f80 r5:84b42400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84926940 INFO: task kworker/1:247:3755 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc375000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:3757 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0635d84 r8:00000002 r7:60000113 r6:e0635d8c r5:84ac6000 r4:84ac6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84926e00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0641000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aff78c r4:84aff400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aff78c r4:84942000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac6000 r8:8494202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942000 r8:8027f5e8 r7:e067de60 r6:84942100 r5:84ac6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849269c0 INFO: task kworker/1:248:3757 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc4e8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:3760 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:3760 tgid:3760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:84ac3c00 r4:84ac3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492d780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ac3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7c78c r4:84b7c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7c78c r4:84942080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3c00 r8:849420ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84942080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942080 r8:8027f5e8 r7:e067de60 r6:8493a000 r5:84ac3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84926d40 INFO: task kworker/1:249:3760 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc4e8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:3761 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0651d84 r8:00000002 r7:60000013 r6:e0651d8c r5:84ac0c00 r4:84ac0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492d1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ac0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84afff8c r4:84affc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afff8c r4:8493a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac0c00 r8:8493a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493a080 r8:8027f5e8 r7:e0699e60 r6:8493a100 r5:84ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84926d40 INFO: task kworker/1:250:3761 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc7a1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3764 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3764 tgid:3764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:84ab6000 r4:84ab6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ab6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd1d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3078c r4:84b30400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3078c r4:84b36000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab6000 r8:84b3602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b36000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b36000 r8:8027f5e8 r7:dff39e60 r6:8493a180 r5:84ab6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b34080 INFO: task kworker/0:78:3764 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc7a1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3765 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:84abec00 r4:84abec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84abec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b34300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b09f8c r4:84b09c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b09f8c r4:84b36080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abec00 r8:84b360ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b36080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b36080 r8:8027f5e8 r7:e06d1e60 r6:8493a200 r5:84abec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b34080 INFO: task kworker/0:79:3765 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bcb0f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:3767 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:3767 tgid:3767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06edd84 r8:00000002 r7:60000013 r6:e06edd8c r5:84b48c00 r4:84b48c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b48c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492d5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7c38c r4:84b7c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7c38c r4:8493a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b48c00 r8:8493a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493a280 r8:8027f5e8 r7:e0699e60 r6:8493a300 r5:84b48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492d040 INFO: task kworker/1:251:3767 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bcde1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3768 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3768 tgid:3768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06f5d84 r8:00000002 r7:60000113 r6:e06f5d8c r5:84b4a400 r4:84b4a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b4a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b349c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b4a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb75000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0a78c r4:84b0a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0a78c r4:84b36100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4a400 r8:84b3612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b36100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b36100 r8:8027f5e8 r7:e06d1e60 r6:8493a380 r5:84b4a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b34180 INFO: task kworker/0:80:3768 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bcde1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:3771 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4729d84 r8:00000002 r7:60000013 r6:e4729d8c r5:84b49800 r4:84b49800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b49800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4729e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492dac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4737000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7cf8c r4:84b7cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7cf8c r4:8493a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b49800 r8:8493a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493a480 r8:8027f5e8 r7:e0699e60 r6:8493a500 r5:84b49800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4729fb0 to 0xe4729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492d6c0 INFO: task kworker/1:252:3771 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bd3d4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b48000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4735e08 r5:00001000 r4:e472b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: bd3d4000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:3777 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e06f1d84 r8:00000002 r7:60000013 r6:e06f1d8c r5:84b4bc00 r4:84b4bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b4bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492dbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e473f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7d38c r4:84b7d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7d38c r4:8493a600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4bc00 r8:8493a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493a600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493a600 r8:8027f5e8 r7:e4729e60 r6:8493a680 r5:84b4bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492d800 INFO: task kworker/1:254:3777 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bd6cb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b4c800 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e474b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b4c800 r8:8493a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493a700 r8:8027f5e8 r7:e06f1e60 r6:8493a780 r5:84b4c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492dc40 INFO: task kworker/1:255:3778 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bd861000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:3780 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4749d84 r8:00000002 r7:60000113 r6:e4749d8c r5:84b4d400 r4:84b4d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b4d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4749e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e475b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:84b4e000 r4:8291892c r4:00000000 r9:83018205 r8:84b4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 r5:00001000 r4:e4767000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8492dd40 INFO: task kworker/1:257:3782 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bdda4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:3784 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4765d84 r8:00000002 r7:60000113 r6:e4765d8c r5:84b4ec00 r4:84b4ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b4ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37000 r5:00001000 r4:e4773000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e8781000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7e78c r4:84b7e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7e78c r4:8493aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4b000 r8:8493aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493aa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493aa00 r8:8027f5e8 r7:e4765e60 r6:8493ab80 r5:84b4b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4771fb0 to 0xe4771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b370c0 INFO: task kworker/1:259:3786 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: be081000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:3788 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84b50000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r5:00001000 r4:dfb17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b50000 r8:8493ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:3789 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0575d84 r8:00000002 r7:60000113 r6:e0575d8c r5:84b50c00 r4:84b50c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b50c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0575e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df885000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7eb8c r4:84b7e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7eb8c r4:8493ad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b50c00 r8:8493adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493ad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493ad80 r8:8027f5e8 r7:e066de60 r6:8493ae00 r5:84b50c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0575fb0 to 0xe0575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b37580 INFO: task kworker/1:261:3789 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd20: be2c1000 dfe07000 00000001 80239b98 7f7af000 00000001 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:00001000 r4:dfc09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b53000 r8:8493ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493ad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493ad00 r8:8027f5e8 r7:e066de60 r6:8493ae80 r5:84b53000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a1fb0 to 0xe05a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b374c0 INFO: task kworker/1:262:3791 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: be2c1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3794 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84b53c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfbd1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e8799d84 r8:00000002 r7:60000113 r6:e8799d8c r5:84b54800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8799e08 r9:83018005 r8:84b54800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 r5:00001000 r4:dfd77000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0af8c r4:84b0ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0af8c r4:84b36200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b54800 r8:84b3622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b36200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b36200 r8:8027f5e8 r7:e06d1e60 r6:8493af80 r5:84b54800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8799fb0 to 0xe8799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b34980 INFO: task kworker/0:82:3796 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: be9fc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:3798 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:3798 tgid:3798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e879dd84 r8:00000002 r7:60000113 r6:e879dd8c r5:84b55400 r4:84b55400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b55400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492dfc0 r5:00001000 r4:dfc7f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84933000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b51800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfc35000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7f78c r4:84b7f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7f78c r4:84933100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b51800 r8:8493312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933100 r8:8027f5e8 r7:e879de60 r6:84933180 r5:84b51800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87a1fb0 to 0xe87a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b37b40 INFO: task kworker/1:264:3800 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bee26000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfca7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b7ff8c r4:84933200 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: bee26000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b56c00 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:3807 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e477dd84 r8:00000002 r7:60000113 r6:e477dd8c r5:84b52400 r4:84b52400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b52400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e477de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3b0c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b52400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8838c r4:84b88000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe477dfb0 to 0xe477dff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r4:84b58000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87ade08 r5:00001000 r4:dfd0d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8878c r4:84b88400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8878c r4:84933500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b58000 r8:8493352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933500 r8:8027f5e8 r7:e87a5e60 r6:84933580 r5:84b58000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87adfb0 to 0xe87adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b200 INFO: task kworker/1:268:3809 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bf62f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/0:83:3812 blocked for more than 453 seconds. r4:84b58c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87b5e08 r5:00001000 r4:e0437000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bb0 r4:00000000 r5:84af0b8c r4:84af0800 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 task:kworker/1:269 state:D stack:0 pid:3813 tgid:3813 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:dfd97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b88b8c r4:84b88800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b88b8c r4:84933600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b46000 r8:8493362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933600 r8:8027f5e8 r7:e87a5e60 r6:84b36380 r5:84b46000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87a9fb0 to 0xe87a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b6c0 INFO: task kworker/1:269:3813 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bfd86000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:3815 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:3815 tgid:3815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87bdd84 r8:00000002 r7:60000113 r6:e87bdd8c r5:84b46c00 r4:84b46c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b46c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87bde08 r5:00001000 r4:dfdcf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b8938c r4:84933680 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd20: bfd86000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:00000000 r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:3817 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87c5d84 r8:00000002 r7:60000113 r6:e87c5d8c r5:84b45400 r4:84b45400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b45400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87c5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3bb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b45400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdeb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8978c r4:84b89400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8978c r4:84933700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b45400 r8:8493372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r5:00001000 r4:e03b1000 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:84b41800 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84b8a38c r4:84933780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b41800 r8:849337ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933780 r8:8027f5e8 r7:e87c5e60 r6:84b36500 r5:84b41800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87d1fb0 to 0xe87d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b940 INFO: task kworker/1:272:3820 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bff8b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:273:3821 blocked for more than 453 seconds. r10:82918930 r9:e87d5d84 r8:00000002 r7:60000113 r6:e87d5d8c r5:84b44800 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe07000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84933800 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: c0537000 dfe07000 00000001 80239b98 7f7af000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03b1000 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:3823 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87d9d84 r8:00000002 r7:60000113 r6:e87d9d8c r5:84b43c00 r4:84b43c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b43c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3bdc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b89f8c r4:84b89c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b89f8c r4:84933880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b43c00 r8:849338ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933880 r8:8027f5e8 r7:e87d1e60 r6:84b36600 r5:84b43c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87d9fb0 to 0xe87d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3bc40 INFO: task kworker/1:274:3823 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0847000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e03d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b8a78c r4:84b8a400 r10:61c88647 r9:84b43000 r8:8493392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933900 r8:8027f5e8 r7:e87d1e60 r6:84b36680 r5:84b43000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87ddfb0 to 0xe87ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3be00 INFO: task kworker/1:275:3825 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0ca0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:276 state:D stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87e1e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0419000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84933980 r8:8027f5e8 r7:e87dde60 r6:84b36700 r5:847bc800 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:3828 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87cdd84 r8:00000002 r7:60000013 r6:e87cdd8c r5:84b5b000 r4:84b5b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b5b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87cde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bba040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8ab8c r4:84b8a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8ab8c r4:84933a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5b000 r8:84933a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933a00 r8:8027f5e8 r7:e87e1e60 r6:84933a80 r5:84b5b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87cdfb0 to 0xe87cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba080 INFO: task kworker/1:277:3828 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0ca0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87b9d84 r8:00000002 r7:60000113 r6:e87b9d8c r5:84b5a400 r4:84b5a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b5a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bba400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0403000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8af8c r4:84b8ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8af8c r4:84933b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8b78c r4:84b8b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8b78c r4:84933c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5d400 r8:84933c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933c00 r8:8027f5e8 r7:e87e1e60 r6:84933c80 r5:84b5d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87e5fb0 to 0xe87e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba300 INFO: task kworker/1:279:3833 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c15e4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:84:3836 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e045d000 r7:dddced80 r6:83018000 r5:84b0b78c r4:84b36780 r4:84bbf1c0 Exception stack(0xe055dd28 to 0xe055dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87e9d84 r8:00000002 r7:60000113 r6:e87e9d8c r5:84718c00 r4:84718c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84718c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87e9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbab00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84718c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8bf8c r4:84b8bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8bf8c r4:84933d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84718c00 r8:84933d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933d00 r8:8027f5e8 r7:e87e5e60 r6:84b36880 r5:84718c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87e9fb0 to 0xe87e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba700 INFO: task kworker/1:280:3838 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c1bbf000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:85 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:e05cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0bb8c r4:84b36900 Exception stack(0xe87f1fb0 to 0xe87f1ff8) r4:84bbf100 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8471a400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:00001000 r4:e04cd000 r7:ddde2d80 r6:83018200 r5:84b8bb8c r4:84933d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471a400 r8:84933dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933d80 r8:8027f5e8 r7:e87e9e60 r6:84b36a00 r5:8471a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87f5fb0 to 0xe87f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba680 INFO: task kworker/1:281:3841 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c1ecc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:3843 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea805d84 r8:00000002 r7:60000013 r6:ea805d8c r5:8471b000 r4:8471b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8471b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea805e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbac00 r5:00001000 r4:e0579000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea805fb0 to 0xea805ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:3846 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea809d84 r8:00000002 r7:60000013 r6:ea809d8c r5:8471bc00 r4:8471bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8471bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea809e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbadc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8471bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0591000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9078c r4:84b90400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9078c r4:84933e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471bc00 r8:84933eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933e80 r8:8027f5e8 r7:ea805e60 r6:84b36b00 r5:8471bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea809fb0 to 0xea809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bbab40 INFO: task kworker/1:283:3846 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c25c3000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b90b8c r4:84933f00 Exception stack(0xea80dfb0 to 0xea80dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd20: c2814000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:3849 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:3849 tgid:3849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87edd84 r8:00000002 r7:60000013 r6:e87edd8c r5:84b5c800 r4:84b5c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b5c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9178c r4:84b91400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9178c r4:84933f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5c800 r8:84933fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84933f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84933f80 r8:8027f5e8 r7:ea80de60 r6:84bb6000 r5:84b5c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe87edfb0 to 0xe87edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba980 INFO: task kworker/1:285:3849 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e05b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b90f8c r4:84bb6080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e03b1000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:287:3853 blocked for more than 453 seconds. r4:8471e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea811e08 r9:83018205 r8:8471e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:00001000 r4:e05e1000 r5:84b9138c r4:84b91000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9138c r4:84bb6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471e000 r8:84bb612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6100 r8:8027f5e8 r7:e87ede60 r6:84b36c80 r5:8471e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea811fb0 to 0xea811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba980 INFO: task kworker/1:287:3853 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c2d39000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3854 blocked for more than 453 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea81de08 r9:83018005 r8:8471ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:00001000 r4:dffa5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:288 state:D stack:0 pid:3857 tgid:3857 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c3c0 r5:00001000 r4:ea827000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b91b8c r4:84bb6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0c00 r8:84bb61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6180 r8:8027f5e8 r7:e87ede60 r6:84b36e00 r5:848b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea831fb0 to 0xea831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3c180 INFO: task kworker/1:288:3857 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c2fcf000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:3859 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea839d84 r8:00000002 r7:60000113 r6:ea839d8c r5:848b2400 r4:848b2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea839e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:848b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r5:00001000 r4:ea83f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848b2400 r8:84bb622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c3182000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:3862 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea861d84 r8:00000002 r7:60000013 r6:ea861d8c r5:848b0000 r4:848b0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea847000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b9238c r4:84b92000 r7:ddde2d80 r6:83018200 r5:84b9238c r4:84bb6280 r10:00000000 r9:84bb6280 r8:8027f5e8 r7:ea839e60 r6:84b36f00 r5:848b0000 r4:84b3c380 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c940 r5:00001000 r4:ea873000 r7:ddde2d80 r6:83018200 r5:84b92b8c r4:84bb6300 r10:00000000 r9:84bb6300 r8:8027f5e8 r7:ea861e60 r6:84b36f80 r5:848b3c00 r4:84b3c380 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:3864 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:3864 tgid:3864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea819d84 r8:00000002 r7:60000113 r6:ea819d8c r5:84b5e000 r4:84b5e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b5e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea819e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea867000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9278c r4:84b92400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9278c r4:84bb6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5e000 r8:84bb63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6380 r8:8027f5e8 r7:ea865e60 r6:84bb6400 r5:84b5e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea819fb0 to 0xea819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3c480 INFO: task kworker/1:292:3864 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: c33ce000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:3867 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea871d84 r8:00000002 r7:60000013 r6:ea871d8c r5:84b5bc00 r4:84b5bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b5bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea871e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3cb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b92f8c r4:84b92c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b92f8c r4:84bb6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5bc00 r8:84bb64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6480 r8:8027f5e8 r7:ea865e60 r6:84bb6500 r5:84b5bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea871fb0 to 0xea871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3c7c0 INFO: task kworker/1:293:3867 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c38ec000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:294:3869 blocked for more than 454 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:df9a1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bb6580 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: c3b91000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:e055ddc0 r5:00001000 r4:e03b1000 r5:84af0b8c r4:84af0800 r4:84a53d80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:3871 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dff2dd84 r8:00000002 r7:60000013 r6:dff2dd8c r5:84b5ec00 r4:84b5ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b5ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3cdc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9378c r4:84b93400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9378c r4:84bb6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b5ec00 r8:84bb66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6680 r8:8027f5e8 r7:ea85de60 r6:84bb6700 r5:84b5ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3c7c0 INFO: task kworker/1:295:3871 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c3d3e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:3873 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:3873 tgid:3873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dffa9d84 r8:00000002 r7:60000113 r6:dffa9d8c r5:84ac6c00 r4:84ac6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb2c0 r5:00001000 r4:dfd19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b9478c r4:84bb6780 r10:00000000 r9:84bb6780 r8:8027f5e8 r7:dff2de60 r6:84bb6800 r5:84ac6c00 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:297:3875 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea825d84 r8:00000002 r7:60000013 r6:ea825d8c r5:84b60c00 r4:84b60c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b60c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea825e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3cf40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b93b8c r4:84b93800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b93b8c r4:84bb6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b60c00 r8:84bb692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6900 r8:8027f5e8 r7:dffa9e60 r6:84bb6880 r5:84b60c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea825fb0 to 0xea825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bba440 INFO: task kworker/1:297:3875 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c3ffd000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:298 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa79000 r5:84b93f8c r4:84b93c00 r10:61c88647 r9:84b62400 r8:84bb69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: c429b000 dfe07000 00000001 80239b98 7f7af000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:299 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b60000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4731e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b60000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9438c r4:84b94000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9438c r4:84bb6a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b60000 r8:84bb6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6a80 r8:8027f5e8 r7:dffa9e60 r6:84bb6b00 r5:84b60000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4731fb0 to 0xe4731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bbad00 INFO: task kworker/1:299:3878 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c429b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:84b63000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b63000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b94f8c r4:84b94c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b94f8c r4:84bb6b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b63000 r8:84bb6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6b80 r8:8027f5e8 r7:dffa9e60 r6:84bb6c00 r5:84b63000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f5fb0 to 0xe05f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcb140 INFO: task kworker/1:300:3881 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c45f8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:3883 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84b63c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb400 r5:00001000 r4:dfe17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bb6c80 r8:8027f5e8 r7:e05f5e60 r6:84bb6d00 r5:84b63c00 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:3884 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4745d84 r8:00000002 r7:60000013 r6:e4745d8c r5:84b64800 r4:84b64800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b64800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4745e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9538c r4:84b95000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9538c r4:84bb6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b64800 r8:84bb6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6d80 r8:8027f5e8 r7:e05f5e60 r6:84bb6e00 r5:84b64800 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:3887 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e476dd84 r8:00000002 r7:60000113 r6:e476dd8c r5:84b66000 r4:84b66000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b66000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e476de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcb900 r5:00001000 r4:dfe8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe476dfb0 to 0xe476dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c4dc0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcbb00 r5:00001000 r4:dfee1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b95b8c r4:84b95800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b95b8c r4:84bb6f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b61800 r8:84bb6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb6f80 r8:8027f5e8 r7:e476de60 r6:84bce000 r5:84b61800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4761fb0 to 0xe4761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcb780 INFO: task kworker/1:304:3889 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c4dc0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:305 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcbcc0 r5:00001000 r4:dff6d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:3892 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:3892 tgid:3892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea881d84 r8:00000002 r7:60000013 r6:ea881d8c r5:84b69800 r4:84b69800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b69800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea881e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcbf00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b69800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff49000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b95f8c r4:84b95c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b95f8c r4:84bce180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b69800 r8:84bce1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xea881fb0 to 0xea881ff8) r4:84bcb800 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:307 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc9500 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bce280 r8:8027f5e8 r7:ea87de60 r6:84bce300 r5:84b6b000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:3897 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea88dd84 r8:00000002 r7:60000013 r6:ea88dd8c r5:84b68000 r4:84b68000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b68000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea88de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc9240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b68000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9678c r4:84b96400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b9678c r4:84bce380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b68000 r8:84bce3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bce380 r8:8027f5e8 r7:ea889e60 r6:84bce400 r5:84b68000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea88dfb0 to 0xea88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcb780 INFO: task kworker/1:308:3897 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c5558000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc93c0 r5:00001000 r4:dffef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96b8c r4:84b96800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b96b8c r4:84bce480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6c800 r8:84bce4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bce480 r8:8027f5e8 r7:ea889e60 r6:84bce500 r5:84b6c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea895fb0 to 0xea895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc9000 INFO: task kworker/1:309:3901 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c59dc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/0:87:3903 blocked for more than 454 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd1a40 r5:00001000 r4:e05d9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:848b6000 r4:00000000 r4:00000000 r5:00001000 r4:e0379000 r7:ddde2d80 r6:83018200 r5:8470738c r4:84bce580 Exception stack(0xea885fb0 to 0xea885ff8) r4:84bc9380 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c62e9000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:3905 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:3905 tgid:3905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea899d84 r8:00000002 r7:60000113 r6:ea899d8c r5:848b6c00 r4:848b6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea899e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd1580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0359000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8470778c r4:84707400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8470778c r4:84bce600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6c00 r8:84bce62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bce600 r8:8027f5e8 r7:ea885e60 r6:84bd6180 r5:848b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea899fb0 to 0xea899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc9180 INFO: task kworker/1:311:3905 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: c62e9000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:312 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc9bc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84b9778c r4:84bce680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:84bce6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bce680 r8:8027f5e8 r7:ea885e60 r6:84bd6200 r5:848b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea89dfb0 to 0xea89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc95c0 INFO: task kworker/1:312:3908 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c62e9000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:3909 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848b1800 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0681000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b9738c r4:84bce700 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: c6687000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3038c r4:84b30000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3038c r4:84bd6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b3000 r8:84bd632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6300 r8:8027f5e8 r7:e06d1e60 r6:84bd6380 r5:848b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a1fb0 to 0xea8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd1a00 INFO: task kworker/0:88:3911 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6687000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:89 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0661000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6bb6000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:3915 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:3915 tgid:3915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8a9d84 r8:00000002 r7:60000113 r6:ea8a9d8c r5:84790c00 r4:84790c00 r5:84790c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3200 r5:00001000 r4:dfe03000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: c6edf000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84793000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08 r5:00001000 r4:e06d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b97f8c r4:84b97c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b97f8c r4:84bce780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84793000 r8:84bce7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bce780 r8:8027f5e8 r7:ea89de60 r6:84bd6600 r5:84793000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b9fb0 to 0xea8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc9a40 INFO: task kworker/1:314:3919 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6edf000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:3920 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8bdd84 r8:00000002 r7:60000113 r6:ea8bdd8c r5:84791800 r4:84791800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84791800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc9d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84791800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b97b8c r4:84b97800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b97b8c r4:84bce800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bc9a40 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:3922 blocked for more than 454 seconds. task:kworker/1:316 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8c5e08 r5:00001000 r4:e4722000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba078c r4:84bce900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84792400 r8:84bce92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bce900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bce900 r8:8027f5e8 r7:ea8b9e60 r6:84bd6700 r5:84792400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8c5fb0 to 0xea8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc9e40 INFO: task kworker/1:316:3922 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c71b7000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e06e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xea8cdfb0 to 0xea8cdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3925 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8d1d84 r8:00000002 r7:60000113 r6:ea8d1d8c r5:84795400 r4:84795400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84795400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84795400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b30f8c r4:84b30c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b30f8c r4:84bd6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84795400 r8:84bd682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6800 r8:8027f5e8 r7:ea8a9e60 r6:84bd6880 r5:84795400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d1fb0 to 0xea8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc22c0 INFO: task kworker/0:91:3925 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c79ba000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84796c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea929000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:3929 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8e1d84 r8:00000002 r7:60000113 r6:ea8e1d8c r5:84796000 r4:84796000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84796000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd1f00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84796000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4739000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba0b8c r4:84ba0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba0b8c r4:84bcea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84796000 r8:84bcea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcea00 r8:8027f5e8 r7:ea8d9e60 r6:84bd6980 r5:84796000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e1fb0 to 0xea8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc9ec0 INFO: task kworker/1:319:3929 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c7d24000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:3931 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8e9d84 r8:00000002 r7:60000113 r6:ea8e9d8c r5:847c8c00 r4:847c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e474d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba0f8c r4:84ba0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba0f8c r4:84bcea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8c00 r8:84bceaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcea80 r8:8027f5e8 r7:ea8d9e60 r6:84bd6a00 r5:847c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Exception stack(0xe055dfb0 to 0xe055dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:847c8000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea901e08 r5:00001000 r4:e8783000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c7f8c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:3935 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea90dd84 r8:00000002 r7:60000113 r6:ea90dd8c r5:847c9800 r4:847c9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea90de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba178c r4:84ba1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba178c r4:84bceb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c9800 r8:84bcebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bceb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bceb80 r8:8027f5e8 r7:ea8d9e60 r6:84bd6b00 r5:847c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea90dfb0 to 0xea90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0100 INFO: task kworker/1:322:3935 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c82d9000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:847cbc00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea909000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba1b8c r4:84ba1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba1b8c r4:84bcec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cbc00 r8:84bcec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcec00 r8:8027f5e8 r7:ea8d9e60 r6:84bd6b80 r5:847cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0200 INFO: task kworker/1:323:3937 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c82d9000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:3939 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea92dd84 r8:00000002 r7:60000113 r6:ea92dd8c r5:847cb000 r4:847cb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea92de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba1f8c r4:84ba1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba1f8c r4:84bcec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cb000 r8:84bcecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcec80 r8:8027f5e8 r7:ea8d9e60 r6:84bd6c00 r5:847cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea92dfb0 to 0xea92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: c85a8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:3942 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea939d84 r8:00000002 r7:60000113 r6:ea939d8c r5:847cc800 r4:847cc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0b00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea941000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba2b8c r4:84ba2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba2b8c r4:84bced00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cc800 r8:84bced2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bced00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bced00 r8:8027f5e8 r7:ea8d9e60 r6:84bd6c80 r5:847cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea939fb0 to 0xea939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd06c0 INFO: task kworker/1:325:3942 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) r5:80000013 r4:80239bb0 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:3943 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:3943 tgid:3943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:847cd400 r4:847cd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea935000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba278c r4:84ba2400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba278c r4:84bced80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cd400 r8:84bcedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bced80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bced80 r8:8027f5e8 r7:ea939e60 r6:84bd6d00 r5:847cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea945fb0 to 0xea945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0640 INFO: task kworker/1:326:3943 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8ad3000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:3947 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea961d84 r8:00000002 r7:60000113 r6:ea961d8c r5:847ca400 r4:847ca400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ca400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea961e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea94d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba2f8c r4:84ba2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba2f8c r4:84bcee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ca400 r8:84bcee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcee00 r8:8027f5e8 r7:ea939e60 r6:84bd6d80 r5:847ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0800 INFO: task kworker/1:327:3947 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8ad3000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:3948 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea965d84 r8:00000002 r7:60000113 r6:ea965d8c r5:847ce000 r4:847ce000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ce000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea959000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba338c r4:84ba3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba338c r4:84bcee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ce000 r8:84bceeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcee80 r8:8027f5e8 r7:ea961e60 r6:84bd6e00 r5:847ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0800 INFO: task kworker/1:328:3948 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8c4d000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:3949 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea969d84 r8:00000002 r7:60000013 r6:ea969d8c r5:84794800 r4:84794800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84794800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc94c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84794800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba3f8c r4:84ba3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba3f8c r4:84bcef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84794800 r8:84bcef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcef00 r8:8027f5e8 r7:ea965e60 r6:84bd6e80 r5:84794800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0800 INFO: task kworker/1:329:3949 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8c4d000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:3952 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:848a9800 r4:848a9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea971000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848a9800 r8:84bcefac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bcef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcef80 r8:8027f5e8 r7:ea969e60 r6:84bd6f00 r5:848a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0bc0 INFO: task kworker/1:330:3952 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:331:3954 blocked for more than 454 seconds. r10:82918930 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:848a8000 r4:00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba3b8c r4:84ba3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba3b8c r4:84bdf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a8000 r8:84bdf02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf000 r8:8027f5e8 r7:ea969e60 r6:84bd6f80 r5:848a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0c40 INFO: task kworker/1:331:3954 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8e96000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba478c r4:84ba4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba478c r4:84bdf080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdf080 Exception stack(0xea8adfb0 to 0xea8adff8) INFO: task kworker/1:332:3956 is blocked on a mutex likely owned by task kworker/1:205:3669. r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:3957 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea991d84 r8:00000002 r7:60000013 r6:ea991d8c r5:84b6a400 r4:84b6a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b6a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba438c r4:84ba4000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea991fb0 to 0xea991ff8) Exception stack(0xe055dd28 to 0xe055dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ea9c5000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:3961 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:3961 tgid:3961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8b1d84 r8:00000002 r7:60000013 r6:ea8b1d8c r5:84b6e000 r4:84b6e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b6e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ea9b9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be4180 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:336:3964 blocked for more than 454 seconds. Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9c9d84 r8:00000002 r7:60000013 r6:ea9c9d8c r5:84b6bc00 r4:84b6bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b6bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba5b8c r4:84ba5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba5b8c r4:84bdf480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6bc00 r8:84bdf4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdf480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf480 r8:8027f5e8 r7:ea9a5e60 r6:84bdf500 r5:84b6bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 r5:00001000 r4:ea9d1000 r7:ddde2d80 r6:83018200 r5:84ba538c r4:84bdf580 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be46c0 INFO: task kworker/1:337:3965 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ca04b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:3967 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9edd84 r8:00000002 r7:60000013 r6:ea9edd8c r5:848ab000 r4:848ab000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ab000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848ab000 r8:84bdf6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:3970 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:3970 tgid:3970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa01d84 r8:00000002 r7:60000113 r6:eaa01d8c r5:848abc00 r4:848abc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848abc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba5f8c r4:84ba5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba5f8c r4:84bdf700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848abc00 r8:84bdf72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa1d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba638c r4:84ba6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba638c r4:84bdf780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848aa400 r8:84bdf7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdf780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdf780 r8:8027f5e8 r7:eaa01e60 r6:8506a100 r5:848aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa0dfb0 to 0xeaa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4880 INFO: task kworker/1:340:3971 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ca3eb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:341:3973 blocked for more than 455 seconds. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfba9000 r10:61c88647 r9:848a8c00 r8:84bdf82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:e055ddc0 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:848ad400 r4:848ad400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ad400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3c00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb69000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3178c r4:84b31400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3178c r4:8506a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ad400 r8:8506a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a200 r8:8027f5e8 r7:ea8a9e60 r6:8506a280 r5:848ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af0b8c r4:84af0800 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df901000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84ba678c r4:84bdf880 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:84af0b8c r4:84af0800 Exception stack(0xe055dfb0 to 0xe055dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:3978 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:3978 tgid:3978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e87c1d84 r8:00000002 r7:60000113 r6:e87c1d8c r5:848aec00 r4:848aec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848aec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e87c1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bef2c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc65000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba738c r4:84ba7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba738c r4:84bdf900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848aec00 r8:84bdf92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdf900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:93 state:D stack:0 pid:3984 tgid:3984 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea82de08 r9:83018005 r8:84b70000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:00001000 r4:e03cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b31f8c r4:84b31c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b31f8c r4:8506a400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b70000 r8:8506a42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8506a400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a400 r8:8027f5e8 r7:ea8a9e60 r6:84bdfa80 r5:84b70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea82dfb0 to 0xea82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf3a80 INFO: task kworker/0:93:3984 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: caebb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84b72400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b72400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bef000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba6f8c r4:84ba6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba6f8c r4:84bdfb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b72400 r8:84bdfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdfb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb00 r8:8027f5e8 r7:e87c1e60 r6:84bdfb80 r5:84b72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bef300 INFO: task kworker/1:344:3986 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000013 r4:80239bb0 r4:e055ddc0 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:345:3988 blocked for more than 455 seconds. task:kworker/1:345 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9e1d84 r8:00000002 r7:60000113 r6:ea9e1d8c r5:84b73000 r4:84b73000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b73000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bef640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b73000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfced000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba7b8c r4:84ba7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ba7b8c r4:84bdfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73000 r8:84bdfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc00 r8:8027f5e8 r7:e87c1e60 r6:84bdfc80 r5:84b73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bef140 INFO: task kworker/1:345:3988 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe055dd28 to 0xe055dd70) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:00001000 r4:e03b1000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 task:kworker/1:347 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea855e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bef980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb038c r4:84bb0000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb038c r4:84bdfe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:84bdfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdfe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfe00 r8:8027f5e8 r7:ea9e1e60 r6:84bdfe80 r5:84b74800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea855fb0 to 0xea855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bef580 INFO: task kworker/1:347:3992 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cb9a1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe055dfb0 to 0xe055dff8) Call trace: [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfd69000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a51100 r4:84b76000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfdbf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb078c r4:84bb0400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb078c r4:85077000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b76000 r8:8507702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85077000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077000 r8:8027f5e8 r7:ea855e60 r6:85077080 r5:84b76000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bef800 INFO: task kworker/1:349:3996 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cb9a1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:350:3998 blocked for more than 455 seconds. r4:84b76c00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0427000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb1b8c r4:85077100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b76c00 r8:8507712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85077100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077100 r8:8027f5e8 r7:eaa2de60 r6:85077180 r5:84b76c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bef9c0 INFO: task kworker/1:350:3998 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) r5:00001000 r4:e03b1000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea879e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84befcc0 Exception stack(0xe055dd28 to 0xe055dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Call trace: r4:850a8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0f8c r4:84bb0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb0f8c r4:85077300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8000 r8:8507732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85077300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077300 r8:8027f5e8 r7:eaa31e60 r6:85077380 r5:850a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:00001000 r4:e03b1000 r4:84a53d80 r4:84a51100 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:4006 tgid:4006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa49d84 r8:00000002 r7:60000113 r6:eaa49d8c r5:850a9800 r4:850a9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85074280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb138c r4:84bb1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb138c r4:85077480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaa49fb0 to 0xeaa49ff8) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:354:4009 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cc5cc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850ac800 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85074600 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8506a500 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4016 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa51d84 r8:00000002 r7:60000013 r6:eaa51d8c r5:850ae000 r4:850ae000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ae000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e04df000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:e055ddc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84a51100 r10:82918930 r9:eaa59d84 r8:00000002 r7:60000013 r6:eaa59d8c r5:850a8c00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2f8c r4:84bb2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb2f8c r4:85077a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8c00 r8:85077a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85077a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077a00 r8:8027f5e8 r7:eaa51e60 r6:85077a80 r5:850a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850747c0 INFO: task kworker/1:358:4018 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e055ddc0 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0597000 r10:61c88647 r9:84b65400 r8:85077b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:359:4019 is blocked on a mutex likely owned by task kworker/1:205:3669. r4:82ac11e4 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:84950000 r4:84950000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84950000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84950000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb338c r4:84bb3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb338c r4:85077c00 r4:85077c00 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e87c7000 r4:85077d80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cd7ab000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/1:362:4026 blocked for more than 455 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r5:00001000 r4:e05cf000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaa55fb0 to 0xeaa55ff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:84a53d80 r4:84a51100 r4:84953000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84953000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea843000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e838c r4:850e8000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e838c r4:85077f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953000 r8:85077f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85077f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077f00 r8:8027f5e8 r7:eaa61e60 r6:85077f80 r5:84953000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85081180 INFO: task kworker/1:363:4029 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cdbf1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84af0b8c r4:84af0800 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081480 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:4032 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:4032 tgid:4032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:84954800 r4:84954800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84954800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127dc0 r4:00000000 r9:83018005 r8:84954800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r5:84b32f8c r4:84b32c00 r4:00000001 INFO: task kworker/0:96:4032 is blocked on a mutex likely owned by task kworker/1:205:3669. r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4034 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:84955400 r4:84955400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84955400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84955400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:00001000 r4:dfa61000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84955400 r8:8507d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84956000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e878c r4:850e8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e878c r4:8507d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956000 r8:8507d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507d280 r8:8027f5e8 r7:eaa6de60 r6:8507d300 r5:84956000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85081400 INFO: task kworker/1:366:4035 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ce45a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84956c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e8b8c r4:850e8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e8b8c r4:8507d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956c00 r8:8507d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507d380 r8:8027f5e8 r7:eaa6de60 r6:8507d400 r5:84956c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85081880 INFO: task kworker/1:367:4037 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ce4bb000 dfe07000 00000001 80239b98 7f7af000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:368 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081b40 r5:00001000 r4:dfa09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd20: ce712000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4042 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea951d84 r8:00000002 r7:60000013 r6:ea951d8c r5:850aec00 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e978c r4:850e9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e978c r4:8507d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aec00 r8:8507d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507d580 r8:8027f5e8 r7:eaa6de60 r6:8507d600 r5:850aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea951fb0 to 0xea951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85081c00 INFO: task kworker/1:369:4042 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ceb2d000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:850b0000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e9b8c r4:850e9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e9b8c r4:8507d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b0000 r8:8507d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507d680 r8:8027f5e8 r7:ea951e60 r6:8507d700 r5:850b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea975fb0 to 0xea975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85081c40 INFO: task kworker/1:370:4044 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf00b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4046 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9b1d84 r8:00000002 r7:60000113 r6:ea9b1d8c r5:850b0c00 r4:850b0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ea38c r4:850ea000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ea38c r4:8507d780 r10:61c88647 r9:850b0c00 r8:8507d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507d780 r8:8027f5e8 r7:ea975e60 r6:8507d800 r5:850b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85081e00 INFO: task kworker/1:371:4046 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf00b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:372 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:850b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r5:00001000 r4:dfe39000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8507d880 r8:8027f5e8 r7:ea9b1e60 r6:8507d900 r5:850b1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85095000 INFO: task kworker/1:372:4047 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf48d000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850b2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r5:00001000 r4:dfeb1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8507d980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 INFO: task kworker/1:374:4051 blocked for more than 455 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff0d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa05fb0 to 0xeaa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85095180 INFO: task kworker/1:374:4051 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf64a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff57000 r7:ddde2d80 r6:83018200 r5:850eaf8c r4:8507db80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850954c0 INFO: task kworker/1:376:4056 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cfc9f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84853c00 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095b80 r5:00001000 r4:dfff1000 r10:61c88647 r9:84853c00 r8:8507dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84854800 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeaa91fb0 to 0xeaa91ff8) r4:85095940 INFO: task kworker/1:378:4059 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d01fb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:4062 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:84853000 r4:84853000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e036d000 r5:850f438c r4:850f4000 r10:61c88647 r9:84853000 r8:8507de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r9:83018205 r8:850b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:00001000 r4:e0037000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ebf8c r4:850ebc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ebf8c r4:8507de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b4800 r8:8507deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8507de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507de80 r8:8027f5e8 r7:eaa9de60 r6:8507df00 r5:850b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85095cc0 INFO: task kworker/1:380:4064 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d066e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe055dfb0 to 0xe055dff8) task:kworker/1:381 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e05e5000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4068 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaa5d84 r8:00000002 r7:60000013 r6:eaaa5d8c r5:850b6000 r4:850b6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85074f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f4b8c r4:850f4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f4b8c r4:84bd7080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b6000 r8:84bd70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7080 r8:8027f5e8 r7:eaa99e60 r6:84bd7100 r5:850b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:382:4068 is blocked on a mutex likely owned by task kworker/1:205:3669. [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:383 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bd7180 Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4072 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:850b8000 r4:850b8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc34c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f578c r4:850f5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f578c r4:84bd7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b8000 r8:84bd72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7280 r8:8027f5e8 r7:eaaa9e60 r6:84bd7300 r5:850b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc3000 INFO: task kworker/1:384:4072 is blocked on a mutex likely owned by task kworker/1:205:3669. Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bd7380 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 Exception stack(0xe055dd28 to 0xe055dd70) dd20: d12c0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4077 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaab9d84 r8:00000002 r7:60000113 r6:eaab9d8c r5:850b9800 r4:850b9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bd7480 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1561000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaab1d84 r8:00000002 r7:60000113 r6:eaab1d8c r5:850ba400 r4:850ba400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ba400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4741000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f678c r4:850f6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f678c r4:84bd7580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ba400 r8:84bd75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7580 r8:8027f5e8 r7:eaab9e60 r6:84bd7600 r5:850ba400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:4080 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:850bb000 r4:850bb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f5f8c r4:850f5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f5f8c r4:84bd7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bb000 r8:84bd76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7680 r8:8027f5e8 r7:eaab1e60 r6:84bd7700 r5:850bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:850bc800 r4:850bc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc3980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4726000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f638c r4:850f6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f638c r4:84bd7780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bc800 r8:84bd77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7780 r8:8027f5e8 r7:eaab1e60 r6:84bd7800 r5:850bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc3780 INFO: task kworker/1:389:4082 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1ed8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4084 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ea875000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850bd400 r8:84bd78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e8785000 r10:61c88647 r9:850be000 r8:84bd79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r4:82ac11e4 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4088 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaac1d84 r8:00000002 r7:60000113 r6:eaac1d8c r5:850bbc00 r4:850bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492f080 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f738c r4:850f7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f738c r4:84bd7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bbc00 r8:84bd7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7a80 r8:8027f5e8 r7:eaac9e60 r6:84bd7b00 r5:850bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc3d80 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea8ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:850f7b8c r4:84bd7b80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4092 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:850c0000 r4:850c0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ea8d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850f778c r4:850f7400 r4:84bd7c80 Exception stack(0xeaad5fb0 to 0xeaad5ff8) INFO: task kworker/1:394:4092 is blocked on a mutex likely owned by task kworker/1:205:3669. r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 r4:e055ddc0 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:850c0c00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:850c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:00001000 r4:ea93b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85104b8c r4:85104800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85104b8c r4:84bd7d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c0c00 r8:84bd7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7d80 r8:8027f5e8 r7:eaad1e60 r6:84bd7e00 r5:850c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917180 INFO: task kworker/1:395:4094 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d2cde000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:396 state:D stack:0 pid:4096 tgid:4096 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:850c1800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917480 r5:00001000 r4:ea903000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850c1800 r8:84bd7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeaaddfb0 to 0xeaaddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:396:4096 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d3210000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4098 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaae1d84 r8:00000002 r7:60000013 r6:eaae1d8c r5:850c2400 r4:850c2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849175c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea911000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510438c r4:85104000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510438c r4:84bd7f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c2400 r8:84bd7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd7f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd7f80 r8:8027f5e8 r7:eaad9e60 r6:848ca000 r5:850c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a51100 r10:82918930 r9:eaae5d84 r8:00000002 r7:60000013 r6:eaae5d8c r5:850c3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8510478c r4:85104400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510478c r4:848ca080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c3000 r8:848ca0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ca080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ca080 r8:8027f5e8 r7:eaad9e60 r6:848ca100 r5:850c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917540 INFO: task kworker/1:398:4100 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d389e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) task:kworker/1:399 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:850c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:ea957000 r7:ddde2d80 r6:83018200 r5:8510538c r4:848ca180 r4:849176c0 Exception stack(0xe055dd28 to 0xe055dd70) dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:4104 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:850c4800 r4:850c4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea949000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850c4800 r8:848ca2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: dd60: 80230ad4 80239bb0 80000013 ffffffff [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4106 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4106 tgid:4106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:850c5400 r4:850c5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510578c r4:85105400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510578c r4:848ca380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c5400 r8:848ca3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ca380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ca380 r8:8027f5e8 r7:eaaede60 r6:848ca400 r5:850c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917c80 INFO: task kworker/1:401:4106 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe055dd28 to 0xe055dd70) r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:402:4108 blocked for more than 456 seconds. r4:850c6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r5:00001000 r4:ea97b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85105b8c r4:85105800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85105b8c r4:848ca480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c6000 r8:848ca4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ca480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ca480 r8:8027f5e8 r7:eaaf1e60 r6:848ca500 r5:850c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917bc0 INFO: task kworker/1:402:4108 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d4735000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4110 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:850c6c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r5:00001000 r4:dfb21000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:850d0000 r4:850d0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2a040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea989000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85105f8c r4:85105c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85105f8c r4:848ca680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d0000 r8:848ca6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ca680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ca680 r8:8027f5e8 r7:eaaf9e60 r6:848ca700 r5:850d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917d80 INFO: task kworker/1:404:4111 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d4735000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4113 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaafdd84 r8:00000002 r7:60000013 r6:eaafdd8c r5:850d0c00 r4:850d0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2a300 r5:00001000 r4:df95d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:848ca780 r8:8027f5e8 r7:eaaf9e60 r6:848ca800 r5:850d0c00 INFO: task kworker/1:405:4113 is blocked on a mutex likely owned by task kworker/1:205:3669. Exception stack(0xe055dd28 to 0xe055dd70) r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850d1800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfb91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85106b8c r4:848ca880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4119 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:850d2400 r4:850d2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2a6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85106f8c r4:85106c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85106f8c r4:848ca980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d2400 r8:848ca9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ca980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ca980 r8:8027f5e8 r7:eab05e60 r6:848caa00 r5:850d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2a400 INFO: task kworker/1:407:4119 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d53e4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:850d3000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2aa00 r5:00001000 r4:dfcb9000 r10:61c88647 r9:850d3000 r8:848caaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2a540 INFO: task kworker/1:408:4120 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d53e4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4122 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r9:83018205 r8:850d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 r5:00001000 r4:dfc67000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:848cab80 r8:8027f5e8 r7:eab11e60 r6:848cac00 r5:850d3c00 INFO: task kworker/1:409:4122 is blocked on a mutex likely owned by task kworker/1:205:3669. dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:850d4800 r4:8291892c r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85082780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511078c r4:85110400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511078c r4:848cac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d4800 r8:848cacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cac80 r8:8027f5e8 r7:eab11e60 r6:848cad00 r5:850d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2a8c0 INFO: task kworker/1:410:4124 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d57f5000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r5:00001000 r4:dfd67000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85107b8c r4:848cad80 Exception stack(0xeab09fb0 to 0xeab09ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:850d6000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfd9f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2ab40 INFO: task kworker/1:412:4128 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d5f01000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:4129 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4129 tgid:4129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:850d6c00 r4:850d6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2af00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511038c r4:85110000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511038c r4:848caf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d6c00 r8:848cafac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848caf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848caf80 r8:8027f5e8 r7:eab19e60 r6:84b39000 r5:850d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab21fb0 to 0xeab21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2ab40 INFO: task kworker/1:413:4129 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d5f01000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4133 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4133 tgid:4133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:850c8000 r4:850c8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb9040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85110b8c r4:85110800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85110b8c r4:84b39080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8000 r8:84b390ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39080 r8:8027f5e8 r7:eab19e60 r6:84b39100 r5:850c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4134 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab29d84 r8:00000002 r7:60000113 r6:eab29d8c r5:850c8c00 r4:850c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb9500 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0401000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511138c r4:85111000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511138c r4:84b39180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8c00 r8:84b391ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39180 r8:8027f5e8 r7:eab25e60 r6:84b39200 r5:850c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab29fb0 to 0xeab29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb9000 INFO: task kworker/1:415:4134 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d6af4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4135 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:850c9800 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb9400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85110f8c r4:85110c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85110f8c r4:84b39280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c9800 r8:84b392ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39280 r8:8027f5e8 r7:eab29e60 r6:84b39300 r5:850c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb9000 INFO: task kworker/1:416:4135 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d6d5a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eab3dd84 r8:00000002 r7:60000013 r6:eab3dd8c r5:84855400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05a7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84855400 r8:84b393ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r5:84af0b8c r4:84af0800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab41d84 r8:00000002 r7:60000013 r6:eab41d8c r5:84856c00 r4:84856c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84856c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb96c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84856c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0431000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511178c r4:85111400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511178c r4:84b39400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856c00 r8:84b3942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39400 r8:8027f5e8 r7:eab3de60 r6:8506a880 r5:84856c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab41fb0 to 0xeab41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb93c0 INFO: task kworker/1:418:4139 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d7061000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4140 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab45d84 r8:00000002 r7:60000113 r6:eab45d8c r5:84856000 r4:84856000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84856000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb9840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84856000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0491000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85111b8c r4:85111800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85111b8c r4:84b39480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:84b394ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39480 r8:8027f5e8 r7:eab3de60 r6:8506a900 r5:84856000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb9600 INFO: task kworker/1:419:4140 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d7061000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84852400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e04d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84852400 r8:84b3952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb93c0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:84850000 r4:84850000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84850000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb9ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84850000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0587000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511238c r4:85112000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511238c r4:84b39580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850000 r8:84b395ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39580 r8:8027f5e8 r7:eab3de60 r6:8506aa00 r5:84850000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb93c0 INFO: task kworker/1:421:4145 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d75a3000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eab59d84 r8:00000002 r7:60000013 r6:eab59d8c r5:848ac800 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea9cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b39600 r8:8027f5e8 r7:eab3de60 r6:8506aa80 r5:848ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb99c0 INFO: task kworker/1:422:4148 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d7927000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:4149 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:85048000 r4:85048000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85048000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb9d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85048000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85112b8c r4:85112800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85112b8c r4:84b39680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85048000 r8:84b396ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeab5dfb0 to 0xeab5dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8504a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r5:00001000 r4:e05df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85112f8c r4:85112c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85112f8c r4:84b39700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504a400 r8:84b3972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39700 r8:8027f5e8 r7:eab59e60 r6:8506ab80 r5:8504a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb9b80 INFO: task kworker/1:424:4152 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d82ad000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4153 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:85048c00 r4:85048c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85048c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:e87f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b39780 Exception stack(0xeab6dfb0 to 0xeab6dff8) r4:84bb9cc0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4156 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:8504b000 r4:8504b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504b000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea841000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511378c r4:85113400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511378c r4:84b39800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504b000 r8:84b3982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39800 r8:8027f5e8 r7:eab59e60 r6:8506ac80 r5:8504b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b39880 r8:8027f5e8 r7:eab59e60 r6:8506ad00 r5:8504bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03b1000 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4159 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:8504c800 r4:8504c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85113f8c r4:85113c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85113f8c r4:84b39900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504c800 r8:84b3992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39900 r8:8027f5e8 r7:eab59e60 r6:8506ad80 r5:8504c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2afc0 INFO: task kworker/1:428:4159 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d8882000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:4162 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:8504e000 r4:8504e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504e000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85114f8c r4:85114c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85114f8c r4:84b39980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504e000 r8:84b399ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39980 r8:8027f5e8 r7:eab59e60 r6:8506ae00 r5:8504e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd180 INFO: task kworker/1:429:4162 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:4164 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:85049800 r4:85049800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85049800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85049800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511478c r4:85114400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511478c r4:84b39a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85049800 r8:84b39a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39a00 r8:8027f5e8 r7:eab89e60 r6:8506ae80 r5:85049800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9e7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeab95fb0 to 0xeab95ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4168 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaba1d84 r8:00000002 r7:60000113 r6:eaba1d8c r5:8504ec00 r4:8504ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bddd00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511638c r4:85116000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511638c r4:84b39b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504ec00 r8:84b39b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39b00 r8:8027f5e8 r7:eab89e60 r6:8506af80 r5:8504ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd380 INFO: task kworker/1:432:4168 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d965a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4170 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:84810c00 r4:84810c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84810c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa19000 r5:8511538c r4:85115000 r7:ddde2d80 r6:83018200 r5:8511538c r4:84b39b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4171 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:84811800 r4:84811800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84811800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84811800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511578c r4:85115400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511578c r4:84b39c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeabb1fb0 to 0xeabb1ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r5:00001000 r4:eabb7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4175 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:84812400 r4:84812400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84812400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bddbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84812400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85115f8c r4:85115c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85115f8c r4:84b39d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84812400 r8:84b39d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39d00 r8:8027f5e8 r7:eaba1e60 r6:84a2e180 r5:84812400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd900 INFO: task kworker/1:436:4175 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) task:kworker/1:437 state:D stack:0 pid:4177 tgid:4177 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdda40 INFO: task kworker/1:437:4177 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dab02000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4181 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:84813000 r4:84813000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84813000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bddf80 r9:83018205 r8:84813000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r5:00001000 r4:eabf3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84bddcc0 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:439:4182 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab31d84 r8:00000002 r7:60000113 r6:eab31d8c r5:850cb000 r4:850cb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511d140 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511738c r4:85117000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511738c r4:84b39e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cb000 r8:84b39eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b39e80 r8:8027f5e8 r7:eac01e60 r6:84b39f00 r5:850cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab31fb0 to 0xeab31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdde00 INFO: task kworker/1:439:4182 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dab02000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac03000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850cc800 r8:84b39fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdde00 INFO: task kworker/1:440:4183 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: daeb7000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4187 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:850cd400 r4:850cd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511d280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511778c r4:85117400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511778c r4:84a25080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cd400 r8:84a250ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25080 r8:8027f5e8 r7:eab31e60 r6:84a25100 r5:850cd400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:850ce000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r9:83018205 r8:850ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 r5:00001000 r4:eac27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85117b8c r4:85117800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85117b8c r4:84a25180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ce000 r8:84a251ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25180 r8:8027f5e8 r7:eabfde60 r6:84a25200 r5:850ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511d1c0 INFO: task kworker/1:442:4188 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: db343000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:443 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850cec00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eac33000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a25280 Exception stack(0xeac25fb0 to 0xeac25ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac3f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeac31fb0 to 0xeac31ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4195 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:850ca400 r4:850ca400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ca400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511d8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511878c r4:85118400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511878c r4:84a25480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ca400 r8:84a254ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25480 r8:8027f5e8 r7:eac31e60 r6:84a25500 r5:850ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511d740 INFO: task kworker/1:445:4195 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: db8e0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4197 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac0dd84 r8:00000002 r7:60000113 r6:eac0dd8c r5:850d8000 r4:850d8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512a800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe99000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ab8c r4:8511a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511ab8c r4:84a25580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d8000 r8:84a255ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25580 r8:8027f5e8 r7:eac3de60 r6:84a25600 r5:850d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511d740 INFO: task kworker/1:446:4197 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dbd85000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:447 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eac57000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:4200 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac55d84 r8:00000002 r7:60000113 r6:eac55d8c r5:850d9800 r4:850d9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511dc80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac67000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85118f8c r4:85118c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85118f8c r4:84a25780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d9800 r8:84a257ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25780 r8:8027f5e8 r7:eac0de60 r6:84a25800 r5:850d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511db00 INFO: task kworker/1:448:4200 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 r4:e055ddc0 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:449:4201 blocked for more than 457 seconds. r5:850da400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eac73000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850da400 r8:84a258ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511de00 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4204 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac81d84 r8:00000002 r7:60000013 r6:eac81d8c r5:850dbc00 r4:850dbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850dbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511dfc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac83000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511978c r4:85119400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511978c r4:84a25980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dbc00 r8:84a259ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r5:00001000 r4:dfadd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85119f8c r4:85119c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85119f8c r4:84a25a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dd400 r8:84a25aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25a80 r8:8027f5e8 r7:eac0de60 r6:84a25b00 r5:850dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bddcc0 INFO: task kworker/1:451:4207 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dc809000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4211 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:850db000 r4:850db000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850db000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512a4c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850db000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd51000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511a38c r4:8511a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511a38c r4:84a25b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850db000 r8:84a25bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4212 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac9dd84 r8:00000002 r7:60000013 r6:eac9dd8c r5:84810000 r4:84810000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84810000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfe5b000 r5:8511a78c r4:8511a400 r4:84a25c80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84815400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r5:00001000 r4:dffbf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84815400 r8:84a25d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8512a5c0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dcc11000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4216 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaca5d84 r8:00000002 r7:60000013 r6:eaca5d8c r5:84816000 r4:84816000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dff25000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511af8c r4:8511ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511af8c r4:84a25d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84816000 r8:84a25dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25d80 r8:8027f5e8 r7:eaca1e60 r6:84a2e400 r5:84816000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512a840 INFO: task kworker/1:455:4216 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dcf12000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:dff69000 r5:8511b38c r4:8511b000 Exception stack(0xeaca9fb0 to 0xeaca9ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:e03b1000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r5:00001000 r4:e05d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511bf8c r4:8511bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511bf8c r4:84a25e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850c00 r8:84a25eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a25e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a25e80 r8:8027f5e8 r7:eaca1e60 r6:84a2e500 r5:84850c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512a980 INFO: task kworker/1:457:4221 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dcf12000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4224 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:8504d400 r4:8504d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8504d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8504d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:82918930 r9:eacb1d84 r8:00000002 r7:60000013 r6:eacb1d8c r5:851a8000 r5:00001000 r4:e0601000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4228 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:851a8c00 r4:851a8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512f400 r5:00001000 r4:e06a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85128000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:461:4229 blocked for more than 457 seconds. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0675000 r4:85128080 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ddbd3000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea8b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3338c r4:84b33000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3338c r4:84a2e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a9800 r8:84a2e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85127e80 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: de18f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r5:00001000 r4:e06df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85174f8c r4:85174c00 r10:61c88647 r9:851b0c00 r8:851282ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r5:851b2400 r4:8291892c r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512fb80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8787000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175b8c r4:85175800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85175b8c r4:85128300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b2400 r8:8512832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85128300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85128300 r8:8027f5e8 r7:eacc1e60 r6:85128380 r5:851b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512f3c0 INFO: task kworker/1:464:4236 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: de18f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:851b3000 r4:00000000 r4:00000000 r5:00001000 r4:e473d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeacb9fb0 to 0xeacb9ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517638c r4:85176000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517638c r4:85128500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b5400 r8:8512852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85128500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85128500 r8:8027f5e8 r7:eacd5e60 r6:85128580 r5:851b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512fa80 INFO: task kworker/1:466:4240 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: de4ff000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4242 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eace1d84 r8:00000002 r7:60000013 r6:eace1d8c r5:851b3c00 r4:851b3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea8d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85175f8c r4:85175c00 r10:61c88647 r9:851b3c00 r8:8512862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 r4:84a51100 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 r9:83018205 r8:851b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:00001000 r4:ea907000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3378c r4:84b33400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b3378c r4:85128700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b6c00 r8:8512872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85128700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85128700 r8:8027f5e8 r7:eacdde60 r6:85128780 r5:851b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace9fb0 to 0xeace9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512fe40 INFO: task kworker/1:468:4245 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: deb97000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ea925000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:851b4800 r8:8512882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:851b1800 r4:00000000 r4:00000000 r5:00001000 r4:ea96b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85176f8c r4:85128980 Exception stack(0xeacf1fb0 to 0xeacf1ff8) r4:85123300 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4251 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf5d84 r8:00000002 r7:60000013 r6:eacf5d8c r5:850dc800 r4:850dc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850dc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851233c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea93d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85176b8c r4:85176800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85176b8c r4:85128900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dc800 r8:8512892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85128900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85128900 r8:8027f5e8 r7:eacf1e60 r6:85128a80 r5:850dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85123240 INFO: task kworker/1:471:4251 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: deded000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:851ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a2e880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: df593000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:4255 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:851abc00 r4:851abc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851abc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512d480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea845000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e0f8c r4:845e0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e0f8c r4:84a2e980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851abc00 r8:84a2e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2e980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2e980 r8:8027f5e8 r7:eacd9e60 r6:84a2ea00 r5:851abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851271c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 r5:00001000 r4:e03b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:472:4256 blocked for more than 458 seconds. r5:851ac800 r4:8291892c r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfb29000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517778c r4:85128b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ac800 r8:85128b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85128b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85128b00 r8:8027f5e8 r7:eacf1e60 r6:84a2ea80 r5:851ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85123600 INFO: task kworker/1:472:4256 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: df923000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:4259 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:851aec00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:df9cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8517738c r4:85177000 r10:61c88647 r9:851aec00 r8:85128bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 r4:e055ddc0 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:474 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:dfc59000 r5:85177f8c r4:85177c00 r7:ddde2d80 r6:83018200 r5:85177f8c r4:85128c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85123700 INFO: task kworker/1:474:4261 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dfccc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:4262 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf9d84 r8:00000002 r7:60000013 r6:eacf9d8c r5:851b6000 r4:851b6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85123a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85123700 INFO: task kworker/1:475:4262 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dfccc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:850de000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab61fb0 to 0xeab61ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85128e80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:478:4269 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaba5d84 r8:00000002 r7:60000013 r6:eaba5d8c r5:851b8c00 r4:851b8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85123f00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd79000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517c78c r4:8517c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517c78c r4:85128f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b8c00 r8:85128fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85128f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85128f80 r8:8027f5e8 r7:eab61e60 r6:8513a000 r5:851b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85123d80 INFO: task kworker/1:478:4269 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fc7a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4270 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:851b9800 r4:851b9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85123240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517cb8c r4:8517c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517cb8c r4:8513a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b9800 r8:8513a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a080 r8:8027f5e8 r7:eab61e60 r6:8513a100 r5:851b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85123d80 INFO: task kworker/1:479:4270 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fc7a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 task:kworker/1:480 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r5:00001000 r4:e0393000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85058000 r8:8513a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 90000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:85058c00 r4:85058c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85058c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85058c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517df8c r4:8517dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517df8c r4:8513a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058c00 r8:8513a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a200 r8:8027f5e8 r7:eab61e60 r6:84a2ec80 r5:85058c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139100 INFO: task kworker/1:481:4274 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80353000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:482:4278 blocked for more than 458 seconds. r10:82918930 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:8505a400 r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0439000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8517d78c r4:8513a280 r4:85139180 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:4280 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:8505b000 r4:8505b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e04b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8517db8c r4:8513a300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505b000 r8:8513a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a300 r8:8027f5e8 r7:eabf1e60 r6:84a2ed80 r5:8505b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139440 INFO: task kworker/1:483:4280 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 808a6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:484 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8513a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a380 r8:8027f5e8 r7:eabf1e60 r6:84a2ee00 r5:8505bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139580 INFO: task kworker/1:484:4282 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 808a6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4284 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:8505c800 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c9000 r5:8517e78c r4:8517e400 r10:61c88647 r9:8505c800 r8:8513a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4286 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac21d84 r8:00000002 r7:60000013 r6:eac21d8c r5:8505d400 r4:8505d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517f38c r4:8517f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517f38c r4:8513a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505d400 r8:8513a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a480 r8:8027f5e8 r7:eac15e60 r6:84a2ef00 r5:8505d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139800 INFO: task kworker/1:486:4286 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80ad2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:4287 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac2dd84 r8:00000002 r7:60000013 r6:eac2dd8c r5:8505e000 r4:8505e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517eb8c r4:8517e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517eb8c r4:8513a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505e000 r8:8513a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a500 r8:8027f5e8 r7:eac21e60 r6:84a2ef80 r5:8505e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139a00 INFO: task kworker/1:487:4287 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:4289 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:851ba400 r4:851ba400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ba400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea981000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517ef8c r4:8517ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517ef8c r4:8513a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ba400 r8:8513a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a580 r8:8027f5e8 r7:eac21e60 r6:8513a600 r5:851ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139780 INFO: task kworker/1:488:4289 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:100:4291 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:100 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:8505ec00 r4:8505ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492f680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e0b8c r4:845e0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e0b8c r4:8513d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505ec00 r8:8513d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513d000 r8:8027f5e8 r7:eacd9e60 r6:8513d080 r5:8505ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8512df00 INFO: task kworker/0:100:4291 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80fa5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85059800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r5:00001000 r4:ea9bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4295 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:851aa400 r4:851aa400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851aa400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512fd40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517fb8c r4:8517f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517fb8c r4:8513a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aa400 r8:8513a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a700 r8:8027f5e8 r7:eac45e60 r6:8513d180 r5:851aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85139e00 INFO: task kworker/1:490:4295 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81445000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:4299 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:4299 tgid:4299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:851ad400 r5:851ad400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeac39fb0 to 0xeac39ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81792000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:84888000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eab9d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4301 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac6dd84 r8:00000002 r7:60000113 r6:eac6dd8c r5:84888c00 r4:84888c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84888c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851300c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84888c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517ff8c r4:8517fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517ff8c r4:8513a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84888c00 r8:8513a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a800 r8:8027f5e8 r7:eac39e60 r6:8513d380 r5:84888c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac6dfb0 to 0xeac6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85130000 INFO: task kworker/1:492:4301 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81de9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:493:4304 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r5:8488a400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85181f8c r4:85181c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85181f8c r4:8513a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488a400 r8:8513a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a880 r8:8027f5e8 r7:eac39e60 r6:8513d400 r5:8488a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead05fb0 to 0xead05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851301c0 INFO: task kworker/1:493:4304 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81fe4000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4306 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead0dd84 r8:00000002 r7:60000113 r6:ead0dd8c r5:8488bc00 r4:8488bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8488bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85130480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8488bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa87000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518078c r4:85180400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518078c r4:8513a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488bc00 r8:8513a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513a900 r8:8027f5e8 r7:ead05e60 r6:8513d480 r5:8488bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85130300 INFO: task kworker/1:494:4306 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81fe4000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 Not tainted 6.15.0-syzkaller #0 task:kworker/1:495 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa9f000 r5:85180b8c r4:85180800 r4:8513a980 Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85130380 INFO: task kworker/1:495:4308 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 82619000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eab53000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85180f8c r4:8513aa80 Exception stack(0xeac89fb0 to 0xeac89ff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4312 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead15d84 r8:00000002 r7:60000113 r6:ead15d8c r5:851bd400 r4:851bd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851308c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518138c r4:85181000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518138c r4:8513ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bd400 r8:8513abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ab80 r8:8027f5e8 r7:ead05e60 r6:8513ac00 r5:851bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85130740 INFO: task kworker/1:497:4312 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 82cc8000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4314 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:851be000 r4:851be000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851be000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85130a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851be000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518178c r4:85181400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518178c r4:8513ac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851be000 r8:8513acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513ac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ac80 r8:8027f5e8 r7:ead05e60 r6:8513ad00 r5:851be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:102:4315 blocked for more than 458 seconds. task:kworker/0:102 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0391000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8513d500 r8:8027f5e8 r7:eacd9e60 r6:8513ad80 r5:851bec00 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851bbc00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:851bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85181b8c r4:85181800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85181b8c r4:8513ae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bbc00 r8:8513ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513ae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ae00 r8:8027f5e8 r7:ead05e60 r6:8513ae80 r5:851bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85130a40 INFO: task kworker/1:499:4319 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8306c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead21d84 r8:00000002 r7:60000113 r6:ead21d8c r5:851c0000 r4:851c0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c0000 r4:8291892c [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df99f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8518238c r4:8513af00 Exception stack(0xead21fb0 to 0xead21ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:8609478c r4:86094400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:501:4322 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:851c1800 r4:851c1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85182b8c r4:85182800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85182b8c r4:8514a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c1800 r8:8514a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a000 r8:8027f5e8 r7:ead21e60 r6:8514a080 r5:851c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfa27000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 839bf000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfd31000 r7:ddde2d80 r6:83018200 r5:85182f8c r4:8514a180 r4:85147080 Exception stack(0xe055dd28 to 0xe055dd70) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4328 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xead41fb0 to 0xead41ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r5:00001000 r4:dfe61000 r5:8518338c r4:85183000 r4:00000001 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8412c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:4332 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead3dd84 r8:00000002 r7:60000113 r6:ead3dd8c r5:851c3000 r4:851c3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147880 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:507 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dff59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85183b8c r4:85183800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85183b8c r4:8514a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c3c00 r8:8514a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a480 r8:8027f5e8 r7:ead3de60 r6:8514a500 r5:851c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85147380 INFO: task kworker/1:507:4333 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84504000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a51100 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08 r5:00001000 r4:e0657000 r7:ddde2d80 r6:83018200 r5:8518c38c r4:8514a580 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:509:4337 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead49d84 r8:00000002 r7:60000013 r6:ead49d8c r5:851c5400 r4:851c5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e069b000 r5:8518c78c r4:8518c400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea987000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84707f8c r4:84707c00 r10:61c88647 r9:851c6000 r8:8513d72c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead51d84 r8:00000002 r7:60000013 r6:ead51d8c r5:851c6c00 r4:851c6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518cb8c r4:8518c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518cb8c r4:8514a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c6c00 r8:8514a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a800 r8:8027f5e8 r7:ead49e60 r6:8514a880 r5:851c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85147b40 INFO: task kworker/1:510:4343 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851c0c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85147fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4724000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518cf8c r4:8518cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518cf8c r4:8514a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0c00 r8:8514a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a900 r8:8027f5e8 r7:ead51e60 r6:8514a980 r5:851c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85147b40 INFO: task kworker/1:511:4345 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84b2c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:512:4346 blocked for more than 458 seconds. r4:851d0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8518d78c r4:8518d400 r10:00000000 r9:8514aa00 r8:8027f5e8 r7:ead5de60 r6:8514aa80 r5:851d0000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4348 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:851d0c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161040 r5:00001000 r4:e4769000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8518d38c r4:8514ab00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a51100 task:kworker/1:514 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea8e3000 r4:8514ac00 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:4353 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead69d84 r8:00000002 r7:60000013 r6:ead69d8c r5:851d3000 r4:851d3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518df8c r4:8518dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518df8c r4:8514ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d3000 r8:8514ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514ad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ad00 r8:8027f5e8 r7:ead65e60 r6:8514ad80 r5:851d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d4800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161880 r5:8518e38c r4:8518e000 Exception stack(0xead79fb0 to 0xead79ff8) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8488e000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161940 r5:00001000 r4:ea93f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518e78c r4:8518e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518e78c r4:8514af00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488e000 r8:8514af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514af00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514af00 r8:8027f5e8 r7:ead79e60 r6:8513d780 r5:8488e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161580 INFO: task kworker/1:517:4356 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 857c1000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea979000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xead85fb0 to 0xead85ff8) r4:851617c0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:519 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea95b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518eb8c r4:8518e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518eb8c r4:85168000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84878c00 r8:8516802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168000 r8:8027f5e8 r7:ead85e60 r6:8513d880 r5:84878c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161980 INFO: task kworker/1:519:4361 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 85cdc000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8518f78c r4:8518f400 r4:85168080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:4364 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:851d5400 r4:851d5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518f38c r4:8518f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518f38c r4:85168200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d5400 r8:8516822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfb4d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85168180 r8:8027f5e8 r7:ead6de60 r6:85168300 r5:851d6000 r4:85161dc0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:4368 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:4368 tgid:4368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadbdd84 r8:00000002 r7:60000013 r6:eadbdd8c r5:851d6c00 r4:851d6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492f7c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518fb8c r4:8518f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8518fb8c r4:85168380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d6c00 r8:851683ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168380 r8:8027f5e8 r7:ead99e60 r6:85168400 r5:851d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161540 INFO: task kworker/1:523:4368 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:524:4371 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred r4:851d2400 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfc15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85168480 r8:8027f5e8 r7:ead99e60 r6:85168500 r5:851d2400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:4373 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:851c8000 r4:851c8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519478c r4:85194400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519478c r4:85168580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c8000 r8:851685ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168580 r8:8027f5e8 r7:eadc1e60 r6:85168600 r5:851c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a92040 INFO: task kworker/1:525:4373 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 86796000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:4375 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:84879800 r4:84879800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84879800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a923c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84879800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85194b8c r4:85194800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85194b8c r4:85168680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84879800 r8:851686ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168680 r8:8027f5e8 r7:eadc9e60 r6:8513d900 r5:84879800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a92180 INFO: task kworker/1:526:4375 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 86796000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4377 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:8487a400 r4:8487a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e040b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: 86b4e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:4379 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadcdd84 r8:00000002 r7:60000113 r6:eadcdd8c r5:8487b000 r4:8487b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:e03b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85194f8c r4:85194c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851c9800 r4:8291892c r4:00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85195b8c r4:85195800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85195b8c r4:85168800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c9800 r8:8516882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168800 r8:8027f5e8 r7:eadf1e60 r6:85168880 r5:851c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a924c0 INFO: task kworker/1:529:4382 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 87328000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92780 r5:00001000 r4:e048d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dd28 to 0xe055dd70) r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4387 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:851cb000 r4:851cb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519638c r4:85196000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519638c r4:85168a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cb000 r8:85168a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168a00 r8:8027f5e8 r7:eadc5e60 r6:85168a80 r5:851cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a92700 INFO: task kworker/1:531:4387 is blocked on a mutex likely owned by task kworker/1:205:3669. r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 task:kworker/1:532 state:D stack:0 pid:4388 tgid:4388 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92a80 r5:00001000 r4:e05b7000 r7:ddde2d80 r6:83018200 r5:85195f8c r4:85168b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168b00 r8:8027f5e8 r7:eae15e60 r6:85168b80 r5:851cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a92700 INFO: task kworker/1:532:4388 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 87d4c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfa0: 00000000 00000000 00000000 00000000 r10:82918930 r9:eae1dd84 r8:00000002 r7:60000013 r6:eae1dd8c r5:851cd400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea835000 r7:ddde2d80 r6:83018200 r5:8519678c r4:85168c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 87d4c000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:534:4392 blocked for more than 459 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92300 r5:00001000 r4:ea9a9000 r7:ddde2d80 r6:83018200 r5:85196b8c r4:85168d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ce000 r8:85168d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168d00 r8:8027f5e8 r7:eae1de60 r6:85168d80 r5:851ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a92c00 INFO: task kworker/1:534:4392 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 88336000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:104:4395 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:104 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae29d84 r8:00000002 r7:60000113 r6:eae29d8c r5:8487bc00 r4:8487bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:8487bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4396 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:851cc800 r4:851cc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfc81000 r7:ddde2d80 r6:83018200 r5:851a4f8c r4:85168e00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85196f8c r4:85196c00 r7:ddde2d80 r6:83018200 r5:85196f8c r4:85168f00 r10:61c88647 r9:851cec00 r8:85168f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85168f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85168f00 r8:8027f5e8 r7:eae25e60 r6:85168f80 r5:851cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845fb080 INFO: task kworker/1:536:4398 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 88d46000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4399 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:851c8c00 r4:851c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea9f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:00001000 r4:ee509000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:105:4402 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:105 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:851d9800 r4:851d9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849143c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85028b8c r4:85028800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85028b8c r4:8513db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d9800 r8:8513dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513db80 r8:8027f5e8 r7:eacd9e60 r6:845cf100 r5:851d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84914100 INFO: task kworker/0:105:4402 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 89235000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 r5:8609478c r4:86094400 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab39000 r7:ddde2d80 r6:83018200 r5:8519778c r4:845cf180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 895e9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:106:4405 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:106 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae45d84 r8:00000002 r7:60000013 r6:eae45d8c r5:851da400 r4:851da400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851da400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851da400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029f8c r4:85029c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85029f8c r4:8513dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851da400 r8:8513dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513dc00 r8:8027f5e8 r7:eae3de60 r6:845cf280 r5:851da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84914300 dd20: 898f9000 e03b3000 00000001 80239b98 7f7b1000 00000001 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914540 r5:00001000 r4:eab83000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84914300 INFO: task kworker/0:107:4407 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 89d38000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:108:4410 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:108 state:D stack:0 pid:4410 tgid:4410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae55d84 r8:00000002 r7:60000013 r6:eae55d8c r5:851d8000 r4:851d8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfb11000 r7:dddced80 r6:83018000 r5:8502978c r4:8513dd00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: 8a4c1000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:00000000 r5:00001000 r4:ee509000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4412 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:8487c800 r4:8487c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845fbf40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487c800 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85197f8c r4:85197c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85197f8c r4:845cf400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487c800 r8:845cf42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845cf400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cf400 r8:8027f5e8 r7:eae25e60 r6:8513dd80 r5:8487c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845fba80 INFO: task kworker/1:539:4412 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8a4c1000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:109:4416 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:109 state:D stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:8487ec00 r4:8487ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029b8c r4:85029800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85029b8c r4:8513de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487ec00 r8:8513de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513de00 r8:8027f5e8 r7:eae45e60 r6:8513de80 r5:8487ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84914680 INFO: task kworker/0:109:4416 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8a963000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:4419 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae5dd84 r8:00000002 r7:60000113 r6:eae5dd8c r5:8487e000 r4:8487e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0017000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502a78c r4:8502a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502a78c r4:8513df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487e000 r8:8513df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513df00 r8:8027f5e8 r7:eae45e60 r6:8513df80 r5:8487e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84914840 INFO: task kworker/0:110:4419 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8a963000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4420 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae61d84 r8:00000002 r7:60000013 r6:eae61d8c r5:8487d400 r4:8487d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85125b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0589000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a5f8c r4:851a5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a5f8c r4:845cf480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487d400 r8:845cf4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845cf480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cf480 r8:8027f5e8 r7:eae2de60 r6:84a1b000 r5:8487d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845fbb40 INFO: task kworker/1:540:4420 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8acc6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851634c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84878000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a438c r4:851a4000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a438c r4:845cf500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84878000 r8:845cf52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845cf500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cf500 r8:8027f5e8 r7:eae61e60 r6:84a1b080 r5:84878000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae65fb0 to 0xeae65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845fb500 INFO: task kworker/1:541:4422 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8aeae000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:111:4423 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:111 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae35d84 r8:00000002 r7:60000013 r6:eae35d8c r5:8488d400 r4:8488d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8488d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84914c00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff93000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84914c40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8aeae000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:112 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84870000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84870000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502af8c r4:8502ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502af8c r4:84a1b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870000 r8:84a1b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b200 r8:8027f5e8 r7:eae5de60 r6:84a1b280 r5:84870000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:113 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05eb000 r7:dddced80 r6:83018000 r5:8502ab8c r4:84a1b300 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd20: 8b5a6000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018005 r8:84871800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502b38c r4:8502b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502b38c r4:84a1b400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84871800 r8:84a1b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b400 r8:8027f5e8 r7:eae69e60 r6:84a1b480 r5:84871800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae75fb0 to 0xeae75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84914f00 INFO: task kworker/0:114:4429 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8b5a6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a1b500 Exception stack(0xeae79fb0 to 0xeae79ff8) r4:84914f00 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: 8babc000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:116:4432 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:116 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:84873000 r4:84873000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84873000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486c080 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84873000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e472d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502b78c r4:8502b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502b78c r4:84a1b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84873000 r8:84a1b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b600 r8:8027f5e8 r7:eae79e60 r6:84a1b680 r5:84873000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c0c0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e055ddc0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eae8dd84 r8:00000002 r7:60000013 r6:eae8dd8c r5:851dd400 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea859000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bb8c r4:8502b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502bb8c r4:84a1b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dd400 r8:84a1b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b700 r8:8027f5e8 r7:eae79e60 r6:845cf580 r5:851dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c300 INFO: task kworker/0:117:4434 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8c342000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 r5:8609478c r4:86094400 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:851db000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea905000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:851a478c r4:84a1b780 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:00001000 r4:ee509000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:4439 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae89d84 r8:00000002 r7:60000013 r6:eae89d8c r5:851de000 r4:851de000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851de000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486c640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851de000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea931000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bf8c r4:8502bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502bf8c r4:84a1b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851de000 r8:84a1b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b800 r8:8027f5e8 r7:eae79e60 r6:845cf680 r5:851de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c300 INFO: task kworker/0:119:4439 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8c537000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851dec00 r4:8291892c r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaee9000 r5:850a3b8c r4:850a3800 r4:845cf700 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:120:4442 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:120 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae85d84 r8:00000002 r7:60000013 r6:eae85d8c r5:84874800 r4:84874800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84874800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486c800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84874800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea955000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e1b8c r4:845e1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e1b8c r4:84a1b880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84874800 r8:84a1b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b880 r8:8027f5e8 r7:eae79e60 r6:84a1b900 r5:84874800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae85fb0 to 0xeae85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c340 INFO: task kworker/0:120:4442 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8c7d5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:121:4445 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae7dd84 r8:00000002 r7:60000113 r6:eae7dd8c r5:84875400 r4:84875400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84875400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486c9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a078c r4:850a0400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a078c r4:84a1b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84875400 r8:84a1b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1b980 r8:8027f5e8 r7:eae79e60 r6:84a1ba00 r5:84875400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c740 INFO: task kworker/0:121:4445 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred dd20: 8cb1b000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:122 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84876000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486c380 r5:00001000 r4:eacc3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:850a178c r4:84a1ba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84876000 r8:84a1baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1ba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1ba80 r8:8027f5e8 r7:eae7de60 r6:84a1bb00 r5:84876000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c7c0 INFO: task kworker/0:122:4448 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8d018000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:123:4449 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:123 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae99d84 r8:00000002 r7:60000013 r6:eae99d8c r5:84876c00 r4:84876c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84876c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486cb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a0b8c r4:850a0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a0b8c r4:84a1bb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84876c00 r8:84a1bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1bb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1bb80 r8:8027f5e8 r7:eaea1e60 r6:84a1bc00 r5:84876c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae99fb0 to 0xeae99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486c7c0 INFO: task kworker/0:123:4449 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8d2c9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r5:00001000 r4:eac4d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84873c00 r8:84a1bcac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd20: 8d2c9000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:125:4453 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:125 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaea9d84 r8:00000002 r7:60000013 r6:eaea9d8c r5:847f8000 r4:847f8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8486cec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a138c r4:850a1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a138c r4:84a1bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8000 r8:84a1bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a1bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1bd80 r8:8027f5e8 r7:eaea1e60 r6:84a1be00 r5:847f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486cc40 INFO: task kworker/0:125:4453 is blocked on a mutex likely owned by task kworker/1:205:3669. Workqueue: events bpf_prog_free_deferred dd20: 8d765000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/0:126:4456 blocked for more than 460 seconds. r10:82918930 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:847f8c00 r4:00000000 r5:00001000 r4:ead09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:850a1b8c r4:84a1be80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1be80 r8:8027f5e8 r7:eaea1e60 r6:84a1bf00 r5:847f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8486ce40 INFO: task kworker/0:126:4456 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8d765000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:847f9800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ead89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 dd20: 8da61000 e03b3000 00000001 80239b98 7f7b1000 00000001 r5:8609478c r4:86094400 dfa0: 00000000 00000000 00000000 00000000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ead45000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fa400 r8:851510ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85151080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151080 r8:8027f5e8 r7:eaeb1e60 r6:85151100 r5:847fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85156080 INFO: task kworker/0:128:4459 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8da61000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:129:4461 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:129 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156500 r5:00001000 r4:eada5000 r7:dddced80 r6:83018000 r5:850a278c r4:85151180 r4:85156200 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eaebdd84 r8:00000002 r7:60000113 r6:eaebdd8c r5:847fbc00 r4:847fbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847fbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851567c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a2f8c r4:850a2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a2f8c r4:85151280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fbc00 r8:851512ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85151280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151280 r8:8027f5e8 r7:eaeb9e60 r6:85151300 r5:847fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85156300 INFO: task kworker/0:130:4464 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8dde6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a2b8c r4:850a2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a2b8c r4:85151380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85151380 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 8e4b2000 e03b3000 00000001 80239b98 7f7b1000 00000001 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:4468 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:4468 tgid:4468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:847fd400 r4:847fd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847fd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaec9000 r7:dddced80 r6:83018000 r5:850a338c r4:85151480 5fa0: 00000000 00000000 00000000 00000000 dd20: 8e4b2000 e03b3000 00000001 80239b98 7f7b1000 00000001 r5:00001000 r4:ee509000 r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:eaecdd84 r8:00000002 r7:60000013 r6:eaecdd8c r5:847fe000 r9:83018005 r8:847fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced80 r6:83018000 r5:850a378c r4:85151580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e8000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851637c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a4b8c r4:851a4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851a4b8c r4:85151680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8000 r8:851516ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85151680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151680 r8:8027f5e8 r7:eaecde60 r6:85151700 r5:851e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed9fb0 to 0xeaed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85156980 INFO: task kworker/0:134:4471 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8e80b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851e9800 r4:00000000 r5:00001000 r4:eaf05000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8efaa000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:136 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eaef5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a3f8c r4:850a3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a3f8c r4:85151880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8c00 r8:851518ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85151880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151880 r8:8027f5e8 r7:eaef9e60 r6:85151900 r5:851e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85156bc0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:4478 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851eb000 r4:8291892c r9:83018005 r8:851eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r7:dddced80 r6:83018000 r5:8508478c r4:85151980 r4:85143000 Exception stack(0xe055dd28 to 0xe055dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000001 INFO: task kworker/0:138:4481 blocked for more than 460 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084b8c r4:85084800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85084b8c r4:85151a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ebc00 r8:85151aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85151a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151a80 r8:8027f5e8 r7:eaefde60 r6:85151b00 r5:851ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf15fb0 to 0xeaf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85143140 INFO: task kworker/0:138:4481 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8f763000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a538c r4:851a5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a538c r4:845cf800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85209800 r8:845cf82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845cf800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cf800 r8:8027f5e8 r7:eae61e60 r6:845cf880 r5:85209800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851636c0 INFO: task kworker/1:543:4482 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:4483 blocked for more than 460 seconds. Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaf29000 r10:61c88647 r9:8520b000 r8:85151bac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r4:00000000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851439c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85085b8c r4:85085800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85085b8c r4:85151c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520bc00 r8:85151c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85151c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151c00 r8:8027f5e8 r7:eaf3de60 r6:845cf980 r5:8520bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/0:141:4486 blocked for more than 460 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r5:00001000 r4:eaf39000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Call trace: r4:00000000 r5:00001000 r4:eaf49000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85143740 INFO: task kworker/0:142:4490 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 8fe22000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf65000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred dd20: 8fe22000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:144 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8520c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086b8c r4:85086800 r7:dddced80 r6:83018000 r5:85086b8c r4:85151f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 902b0000 e03b3000 00000001 80239b98 7f7b1000 00000001 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r5:00001000 r4:eaf71000 r10:61c88647 r9:8520d400 r8:8513602c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508678c r4:85086400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508678c r4:85136080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85208000 r8:851360ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136080 r8:8027f5e8 r7:eaf79e60 r6:845cfb00 r5:85208000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85143ec0 INFO: task kworker/0:146:4497 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 90927000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85143d00 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred r4:851eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508738c r4:85087000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508738c r4:85136180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851eec00 r8:851361ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136180 r8:8027f5e8 r7:eafa9e60 r6:85136200 r5:851eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ed1c0 INFO: task kworker/0:148:4501 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 90bf4000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 r4:00000000 r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:4502 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:851ea400 r4:851ea400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ea400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508778c r4:85087400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508778c r4:85136280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ea400 r8:851362ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136280 r8:8027f5e8 r7:eaf69e60 r6:85136300 r5:851ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ed1c0 INFO: task kworker/0:149:4502 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 90e59000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:4508 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df881d84 r8:00000002 r7:60000113 r6:df881d8c r5:849e8c00 r4:849e8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed800 r5:00001000 r4:e03df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a5b8c r4:851a5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851a5b8c r4:85136380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8c00 r8:851363ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136380 r8:8027f5e8 r7:eaeede60 r6:85136400 r5:849e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf881fb0 to 0xdf881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ed380 INFO: task kworker/0:150:4508 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 91104000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfb71000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85087b8c r4:85136480 Exception stack(0xeafcdfb0 to 0xeafcdff8) Workqueue: events bpf_prog_free_deferred dd20: 912d0000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:4510 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:4510 tgid:4510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:849ea400 r4:849ea400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ea400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eda40 r5:00001000 r4:e0441000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849ea400 r8:851365ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 914cd000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4511 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:8520ec00 r4:8520ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85125b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8520ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a578c r4:851a5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a578c r4:845cfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520ec00 r8:845cfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845cfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cfc00 r8:8027f5e8 r7:eae61e60 r6:845cfc80 r5:8520ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85125fc0 INFO: task kworker/1:544:4511 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: 91626000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:153 state:D stack:0 pid:4514 tgid:4514 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea947000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524178c r4:85241400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524178c r4:85136680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dc800 r8:851366ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136680 r8:8027f5e8 r7:eafd1e60 r6:845cfd80 r5:851dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ed980 INFO: task kworker/0:153:4514 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 91a5e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:85218000 r4:85218000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85218000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be0300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85218000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a638c r4:851a6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a638c r4:845cfe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:845cfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845cfe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cfe00 r8:8027f5e8 r7:eae61e60 r6:845cfe80 r5:85218000 Exception stack(0xeafddfb0 to 0xeafddff8) r4:851253c0 Call trace: dd20: 91c69000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:154 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85218c00 r4:85218c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85218c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847edbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524038c r4:85240000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524038c r4:85136700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218c00 r8:8513672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136700 r8:8027f5e8 r7:eafd9e60 r6:845cff00 r5:85218c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ed980 INFO: task kworker/0:154:4517 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 91c69000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/0:155:4520 blocked for more than 460 seconds. r10:82918930 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:85219800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847edd00 r5:00001000 r4:ea833000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524078c r4:85240400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524078c r4:85136780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85219800 r8:851367ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136780 r8:8027f5e8 r7:eafd9e60 r6:845cff80 r5:85219800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ed9c0 INFO: task kworker/0:155:4520 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 91f4a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:156 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:ea9c1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: r4:82ac11e4 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:849eb000 r4:849eb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849eb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be0840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab37000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a6f8c r4:851a6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a6f8c r4:8486d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eb000 r8:8486d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8486d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8486d000 r8:8027f5e8 r7:eafdde60 r6:85136880 r5:849eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:849ebc00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea9e3000 r10:61c88647 r9:849ebc00 r8:8486d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be0180 INFO: task kworker/1:547:4525 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 92667000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:849ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:00001000 r4:eaa1b000 r10:61c88647 r9:849ec800 r8:8486d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 92667000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:84a53d80 r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa93000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:4532 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaff5d84 r8:00000002 r7:60000013 r6:eaff5d8c r5:849ee000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r5:00001000 r4:eb019000 r5:85197b8c r4:85197800 r7:dddced80 r6:83018000 r5:85197b8c r4:85136b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ee000 r8:85136b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85136b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85136b00 r8:8027f5e8 r7:eafd9e60 r6:85136b80 r5:849ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851257c0 INFO: task kworker/0:158:4532 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:549:4534 blocked for more than 460 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabb5000 r5:851a778c r4:851a7400 r4:00000001 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:82918930 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:849e8000 r5:00001000 r4:eab85000 r7:ddde2d80 r6:83018200 r5:851a738c r4:8486d200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8000 r8:8486d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8486d200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8486d200 r8:8027f5e8 r7:eb001e60 r6:85136c80 r5:849e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be0800 INFO: task kworker/1:550:4536 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 930ed000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:551 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:849e0000 r4:849e0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r5:00001000 r4:eae37000 r5:851a7b8c r4:851a7800 r4:00000001 r4:84be0940 Exception stack(0xe055dd28 to 0xe055dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:849e0c00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:851a7f8c r4:8486d300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:8486d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8486d300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8486d300 r8:8027f5e8 r7:eb011e60 r6:85136d80 r5:849e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be09c0 INFO: task kworker/1:552:4540 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9383d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df9e7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r5:00001000 r4:eb031000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb029fb0 to 0xeb029ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:159 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ea90f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9402b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4547 blocked for more than 461 seconds. r10:82918930 r9:eb04dd84 r8:00000002 r7:60000013 r6:eb04dd8c r5:849e4800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be0240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb039000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526c78c r4:8526c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb04dfb0 to 0xeb04dff8) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:8526cf8c r4:8526cc00 r4:00000001 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4551 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf55d84 r8:00000002 r7:60000113 r6:eaf55d8c r5:849e5400 r4:849e5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r9:83018205 r8:849e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r7:ddde2d80 r6:83018200 r5:8526db8c r4:8486d580 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4553 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfec9000 r7:ddde2d80 r6:83018200 r5:8526d78c r4:8486d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fec00 r8:8486d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8486d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8486d600 r8:8027f5e8 r7:eaf55e60 r6:84a2d080 r5:847fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:e055ddc0 r5:8609478c r4:86094400 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Call trace: r4:00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e035d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526df8c r4:8526dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526df8c r4:8486d680 dfa0: 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4559 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaffdd84 r8:00000002 r7:60000013 r6:eaffdd8c r5:8521c800 r4:8521c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8521c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ecbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521c800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526e78c r4:8526e400 r7:ddde2d80 r6:83018200 r5:8526e78c r4:8486d700 Exception stack(0xeaffdfb0 to 0xeaffdff8) Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:8521e000 r4:8521e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8521e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eca40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521e000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0659000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526e38c r4:8526e000 r7:ddde2d80 r6:83018200 r5:8526e38c r4:8486d800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a51100 r10:82918930 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:8521ec00 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e475d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526eb8c r4:8526e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526eb8c r4:8486d900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521ec00 r8:8486d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8486d900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8486d900 r8:8027f5e8 r7:eaffde60 r6:8486d980 r5:8521ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847ecb40 INFO: task kworker/1:562:4563 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9529b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:8521a400 r4:8521a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8521a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9529b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:564:4567 blocked for more than 461 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2f380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8521b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526f38c r4:8526f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526f38c r4:8486db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80000013 ffffffff [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:ead33000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8486dc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85228000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea977000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85241b8c r4:85241800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85241b8c r4:84a2d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228000 r8:84a2d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2d180 r8:8027f5e8 r7:eafd9e60 r6:8486dd00 r5:85228000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be1e00 INFO: task kworker/0:160:4571 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 95bed000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r5:00001000 r4:eb275000 r5:85242f8c r4:85242c00 r10:61c88647 r9:85229800 r8:84a2d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2d200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2d200 r8:8027f5e8 r7:eb075e60 r6:8486dd80 r5:85229800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be1f40 INFO: task kworker/0:161:4572 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r5:00001000 r4:ee509000 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb081d84 r8:00000002 r7:60000013 r6:eb081d8c r5:8522a400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb049000 r5:8527cb8c r4:8527c800 Exception stack(0xeb081fb0 to 0xeb081ff8) Call trace: r5:80000013 r4:80239bb0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:566:4577 blocked for more than 461 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8522bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526f78c r4:8526f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526f78c r4:8486de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522bc00 r8:8486deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8486de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8486de80 r8:8027f5e8 r7:eb071e60 r6:8486df00 r5:8522bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb085fb0 to 0xeb085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2f300 INFO: task kworker/1:566:4577 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9656f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 INFO: task kworker/1:567:4578 blocked for more than 461 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r5:00001000 r4:eac69000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2f300 INFO: task kworker/1:567:4578 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9656f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:84848000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2f800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84848000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526ff8c r4:8526fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8526ff8c r4:84bd8000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848000 r8:84bd802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8000 r8:8027f5e8 r7:eb071e60 r6:84a2d380 r5:84848000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2f680 INFO: task kworker/1:568:4581 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9656f000 e03b3000 00000001 80239b98 7f7b1000 00000001 r5:80000013 r4:80239bb0 r4:00000000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb08dd84 r8:00000002 r7:60000113 r6:eb08dd8c r5:84848c00 r4:84848c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84848c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2fc00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84848c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85274b8c r4:85274800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85274b8c r4:84bd8080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848c00 r8:84bd80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8080 r8:8027f5e8 r7:eb071e60 r6:84a2d400 r5:84848c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:ead71000 r5:8527478c r4:85274400 r10:61c88647 r9:84849800 r8:84bd812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8100 r8:8027f5e8 r7:eb08de60 r6:84a2d480 r5:84849800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a2f700 INFO: task kworker/1:570:4586 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 96d0a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8484bc00 r4:00000000 r5:00001000 r4:eaddb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 96d0a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eadf9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 97044000 e03b3000 00000001 80239b98 7f7b1000 00000001 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaeff000 r7:ddde2d80 r6:83018200 r5:8527638c r4:84bd8280 r4:84a2fbc0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4592 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0b5d84 r8:00000002 r7:60000013 r6:eb0b5d8c r5:8484a400 r4:8484a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8484a400 r8:84bd832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8484ec00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:4596 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:8484e000 r4:8484e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2f280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8484e000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85275f8c r4:85275c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85275f8c r4:84bd8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:577:4598 blocked for more than 461 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r5:00001000 r4:eaf1b000 r4:84bd8480 r4:84a2ff80 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0d9d84 r8:00000002 r7:60000013 r6:eb0d9d8c r5:851fa400 r4:851fa400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851fa400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527678c r4:85276400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527678c r4:84bd8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fa400 r8:84bd852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8500 r8:8027f5e8 r7:eb0d1e60 r6:84a2d880 r5:851fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 97fb4000 e03b3000 00000001 80239b98 7f7b1000 00000001 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:851f8000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:851f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85276b8c r4:85276800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85276b8c r4:84bd8580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f8000 r8:84bd85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8580 r8:8027f5e8 r7:eb0d1e60 r6:84a2d900 r5:851f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f380 INFO: task kworker/1:579:4603 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9805e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf37000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:00000000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf6b000 r7:ddde2d80 r6:83018200 r5:8527778c r4:84bd8680 r4:8513f180 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:4608 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:8522d400 r4:8522d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8522d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8522d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527738c r4:85277000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527738c r4:84bd8780 r10:61c88647 r9:8522d400 r8:84bd87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:8522b000 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:eaf75000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 99521000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r4:8522ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r9:83018205 r8:8522ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:eafaf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8513fac0 INFO: task kworker/1:584:4613 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 99521000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eaf8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277f8c r4:85277c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85277f8c r4:84bd8a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522e000 r8:84bd8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8a80 r8:8027f5e8 r7:eb0e5e60 r6:84bd8b00 r5:8522e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:586 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:4619 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb0f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527cf8c r4:8527cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527cf8c r4:84bd8c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fbc00 r8:84bd8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8c80 r8:8027f5e8 r7:eb0e5e60 r6:84a2da00 r5:851fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 task:kworker/1:588 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb101000 r5:8527d38c r4:8527d000 r10:61c88647 r9:851fe000 r8:84bd8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513e080 INFO: task kworker/1:588:4622 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 99de8000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb11d000 r7:ddde2d80 r6:83018200 r5:8527db8c r4:84bd8d80 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e055ddc0 r5:8609478c r4:86094400 Exception stack(0xe055dfb0 to 0xe055dff8) task:kworker/1:590 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb131d84 r8:00000002 r7:60000013 r6:eb131d8c r5:851f9800 r4:851f9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513e400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527d78c r4:8527d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527d78c r4:84bd8e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f9800 r8:84bd8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8e00 r8:8027f5e8 r7:eb125e60 r6:84a2db80 r5:851f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513e480 INFO: task kworker/1:590:4626 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb155000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527e78c r4:84bd8e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228c00 r8:84bd8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8e80 r8:8027f5e8 r7:eb125e60 r6:84bd8f00 r5:85228c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513e3c0 INFO: task kworker/1:591:4628 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:849e6000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:849e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527df8c r4:8527dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527df8c r4:84bd8f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e6000 r8:84bd8fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd8f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd8f80 r8:8027f5e8 r7:eb115e60 r6:85134000 r5:849e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513e3c0 INFO: task kworker/1:592:4629 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84a51100 r5:851fc800 r4:8291892c r9:83018005 r8:851fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:4633 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:851fec00 r4:851fec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851fec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513e980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527e38c r4:8527e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527e38c r4:85134080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fec00 r8:851340ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85134080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85134080 r8:8027f5e8 r7:eb115e60 r6:84a2dd00 r5:851fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513e7c0 INFO: task kworker/1:593:4633 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9b0ae000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4635 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa33000 r10:61c88647 r9:8484d400 r8:8513412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 Exception stack(0xe055dfb0 to 0xe055dff8) Call trace: [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:4639 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:85230c00 r4:85230c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85230c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ee00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85230c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:00001000 r4:dfb93000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:dfdd7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:4644 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:85233000 r4:85233000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85233000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ff80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85233000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85134480 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 Exception stack(0xe055dfb0 to 0xe055dff8) Call trace: r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85157100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85233c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527ff8c r4:8527fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527ff8c r4:85134580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233c00 r8:851345ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85134580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85134580 r8:8027f5e8 r7:eb181e60 r6:85134600 r5:85233c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85157040 INFO: task kworker/1:599:4646 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85234800 r4:8291892c r9:83018205 r8:85234800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r10:61c88647 r9:85234800 r8:851346ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:00001000 r4:ee509000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:4650 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:85235400 r4:85235400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85235400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85157380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85235400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528438c r4:85284000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528438c r4:85134780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85235400 r8:851347ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85134780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85134780 r8:8027f5e8 r7:eb189e60 r6:85134800 r5:85235400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:602:4652 blocked for more than 462 seconds. r5:85236000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea9db000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:8609478c r4:86094400 r4:84a53d80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:4654 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:4654 tgid:4654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:85236c00 r4:85236c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85236c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85157640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85236c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85284b8c r4:85284800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85284b8c r4:85134980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236c00 r8:851349ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85134980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85134980 r8:8027f5e8 r7:eb19de60 r6:85134a00 r5:85236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851574c0 INFO: task kworker/1:603:4654 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85230000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:00001000 r4:eaa25000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:605 state:D stack:0 pid:4658 tgid:4658 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r9:83018205 r8:8520e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r7:ddde2d80 r6:83018200 r5:85285b8c r4:85134b80 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9d662000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaab3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:4662 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:4662 tgid:4662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1b9d84 r8:00000002 r7:60000013 r6:eb1b9d8c r5:847f0000 r4:847f0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85157ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85285f8c r4:85285c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85285f8c r4:85134d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f0000 r8:85134dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85134d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85134d80 r8:8027f5e8 r7:eb1a5e60 r6:84a2de00 r5:847f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85157bc0 INFO: task kworker/1:607:4662 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9df2d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:4664 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:847f0c00 r4:847f0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528638c r4:85286000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528638c r4:85134e00 r4:85134e00 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:4665 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:847f2400 r4:847f2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1c1c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528678c r4:85286400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528678c r4:85134e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85134e80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r5:00001000 r4:ee509000 r4:84a53d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb017000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f4800 r8:85134fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85134f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85134f80 r8:8027f5e8 r7:eb1c9e60 r6:84943000 r5:847f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a1c240 INFO: task kworker/1:611:4670 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9e682000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:4673 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:4673 tgid:4673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1c480 r5:00001000 r4:eb02d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b38000 r8:8027f5e8 r7:eb1c9e60 r6:84943080 r5:847f3c00 Workqueue: events bpf_prog_free_deferred dd20: 9ee92000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:847f5400 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1e5000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9f0ee000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:4677 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1b5d84 r8:00000002 r7:60000013 r6:eb1b5d8c r5:85239800 r4:85239800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85239800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1c740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85239800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb169000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528778c r4:85287400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528778c r4:84b38100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r4:84a53d80 r4:84a51100 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85287f8c r4:84b38200 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:4681 blocked for more than 462 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1cb40 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a1c680 INFO: task kworker/1:616:4681 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9f7ce000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r5:00001000 r4:eb209000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528c78c r4:8528c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528c78c r4:84b38400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f1800 r8:84b3842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b38400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b38400 r8:8027f5e8 r7:eb1e9e60 r6:84943180 r5:847f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a1c9c0 INFO: task kworker/1:617:4684 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:618 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:eb225000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a1cb00 INFO: task kworker/1:618:4685 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 9fb71000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:4686 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:8523c800 r4:8523c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1ce00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb215000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528cb8c r4:8528c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528cb8c r4:84b38580 r10:61c88647 r9:8523c800 r8:84b385ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84924040 r5:00001000 r4:eb231000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: a03f4000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84924280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528d78c r4:8528d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528d78c r4:84b38780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523e000 r8:84b387ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b38780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b38780 r8:8027f5e8 r7:eb219e60 r6:84b38800 r5:8523e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a1cec0 INFO: task kworker/1:621:4690 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a03f4000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:4692 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84959800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb269000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85242b8c r4:84943200 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: a03f4000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:4695 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb261d84 r8:00000002 r7:60000013 r6:eb261d8c r5:84958000 r4:84958000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84958000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849243c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84958000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528db8c r4:8528d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528db8c r4:84b38880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958000 r8:84b388ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b38880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b38880 r8:8027f5e8 r7:eb229e60 r6:84943300 r5:84958000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84924100 INFO: task kworker/1:622:4695 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a06fd000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a51100 task:kworker/1:623 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb28d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8528e78c r4:8528e400 r10:61c88647 r9:8523ec00 r8:84b3892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb259000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8528df8c r4:84b38a00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: a08d0000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:00000000 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:4700 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:852c8c00 r4:852c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84924900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb281000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528e38c r4:8528e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528e38c r4:84b38b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8c00 r8:84b38b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b38b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b38b00 r8:8027f5e8 r7:eb235e60 r6:84b38b80 r5:852c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:4702 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb26dd84 r8:00000002 r7:60000113 r6:eb26dd8c r5:84958c00 r4:84958c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84958c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b9a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84958c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538038c r4:85380000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538038c r4:84943380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958c00 r8:849433ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84943380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:166 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:852c9800 r4:852c9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524378c r4:85243400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524378c r4:84943480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c9800 r8:849434ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84943480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84943480 r8:8027f5e8 r7:eb26de60 r6:84b38c00 r5:852c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492c2c0 INFO: task kworker/0:166:4704 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a133b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb29d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8528ef8c r4:84b38c80 Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:627 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528eb8c r4:84b38d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cb000 r8:84b38dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b38d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b38d80 r8:8027f5e8 r7:eb2a1e60 r6:84b38e00 r5:852cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849249c0 INFO: task kworker/1:627:4708 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a1699000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:628:4710 blocked for more than 462 seconds. r4:852cbc00 r5:852cbc00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84924f00 r5:00001000 r4:eb2ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b38e80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a1d63000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:852cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 r5:00001000 r4:eb2b9000 r10:61c88647 r9:852cc800 r8:84b38fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:630 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84924ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528fb8c r4:8528f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528fb8c r4:84bc5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cd400 r8:84bc50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5080 r8:8027f5e8 r7:eb2b1e60 r6:84bc5100 r5:852cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85150600 INFO: task kworker/1:630:4714 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a228e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:4717 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:631 state:D stack:0 pid:4717 tgid:4717 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8528ff8c r4:84bc5180 r4:00000001 Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507c000 INFO: task kworker/1:631:4717 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a26fe000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:4719 blocked for more than 463 seconds. Call trace: [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2dd000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc5280 r8:8027f5e8 r7:eb2c9e60 r6:84bc5300 r5:852cec00 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529878c r4:85298400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529878c r4:84bc5380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8000 r8:84bc53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5380 r8:8027f5e8 r7:eb2e1e60 r6:84bc5400 r5:852c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507c180 INFO: task kworker/1:633:4721 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a2ee1000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb301000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:852d0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85298b8c r4:85298800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85298b8c r4:84bc5580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0c00 r8:84bc55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5580 r8:8027f5e8 r7:eb2f9e60 r6:84bc5600 r5:852d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507c440 INFO: task kworker/1:635:4724 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a3127000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:8609478c r4:86094400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb30d000 r5:8529938c r4:85299000 r10:00000000 r9:84bc5680 r8:8027f5e8 r7:eb2f9e60 r6:84bc5700 r5:852d1800 Workqueue: events bpf_prog_free_deferred dd20: a3780000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:4728 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:852d2400 r4:852d2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507cb00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb319000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529978c r4:85299400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529978c r4:84bc5780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d2400 r8:84bc57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5780 r4:00000001 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:4730 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb31dd84 r8:00000002 r7:60000013 r6:eb31dd8c r5:852d3000 r4:852d3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507cc40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb325000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85299b8c r4:85299800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85299b8c r4:84bc5880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8507c980 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:4732 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb335d84 r8:00000002 r7:60000013 r6:eb335d8c r5:852d3c00 r4:852d3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507cdc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb331000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85299f8c r4:85299c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85299f8c r4:84bc5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d3c00 r8:84bc59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5980 r8:8027f5e8 r7:eb31de60 r6:84bc5a00 r5:852d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507cac0 INFO: task kworker/1:639:4732 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a3c8f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529a38c r4:8529a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529a38c r4:84bc5a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d4800 r8:84bc5aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5a80 r8:8027f5e8 r7:eb335e60 r6:84bc5b00 r5:852d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507cbc0 INFO: task kworker/1:640:4735 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a4042000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150600 r9:83018205 r8:852d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb349000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529a78c r4:8529a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529a78c r4:84bc5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d5400 r8:84bc5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5b80 r8:8027f5e8 r7:eb341e60 r6:84bc5c00 r5:852d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8507cd40 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb355000 r7:ddde2d80 r6:83018200 r5:8529ab8c r4:84bc5c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d6000 r8:84bc5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5c80 r8:8027f5e8 r7:eb34de60 r6:84bc5d00 r5:852d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed080 INFO: task kworker/1:642:4738 is blocked on a mutex likely owned by task kworker/1:205:3669. Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:4741 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb329d84 r8:00000002 r7:60000113 r6:eb329d8c r5:852d8000 r4:852d8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bed300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb361000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529af8c r4:8529ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529af8c r4:84bc5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8000 r8:84bc5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bed2c0 dd20: a4809000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eb36d000 r7:ddde2d80 r6:83018200 r5:8529b38c r4:84bc5e80 r4:84bc5e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc5e80 r8:8027f5e8 r7:eb329e60 r6:84bc5f00 r5:852d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed2c0 INFO: task kworker/1:644:4742 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a4809000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r4:852da400 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bc5f80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed480 INFO: task kworker/1:645:4744 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a4b10000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:4747 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb365d84 r8:00000002 r7:60000013 r6:eb365d8c r5:852db000 r4:852db000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852db000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bedb00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb391000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529bf8c r4:8529bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529bf8c r4:84bd4080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852db000 r8:84bd40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4080 r8:8027f5e8 r7:eb37de60 r6:84bd4100 r5:852db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed6c0 INFO: task kworker/1:646:4747 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a4b10000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:4748 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:852dbc00 r4:852dbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852dbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bed900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb385000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529bb8c r4:8529b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529bb8c r4:84bd4180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dbc00 r8:84bd41ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4180 r8:8027f5e8 r7:eb365e60 r6:84bd4200 r5:852dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed780 INFO: task kworker/1:647:4748 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a4b10000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:4751 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:852dd400 r4:852dd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852dd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bedc00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0f3000 r5:00001000 r4:eb39d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852dd400 r8:84bd42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4280 r8:8027f5e8 r7:eb365e60 r6:84bd4300 r5:852dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed980 INFO: task kworker/1:648:4751 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a4ee3000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:852de000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bd4380 Exception stack(0xeb3adfb0 to 0xeb3adff8) INFO: task kworker/1:649:4752 is blocked on a mutex likely owned by task kworker/1:205:3669. r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a53ca000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:4754 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:852d9800 r4:852d9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492cd00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa07000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533cb8c r4:8533c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533cb8c r4:84bd4480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d9800 r8:84bd44ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4480 r8:8027f5e8 r7:eb3ade60 r6:84943500 r5:852d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bedd40 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 Exception stack(0xe055dd28 to 0xe055dd70) r5:80000013 r4:80239bb0 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:4757 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb095d84 r8:00000002 r7:60000013 r6:eb095d8c r5:8495e000 r4:8495e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533cf8c r4:8533cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533cf8c r4:84bd4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495e000 r8:84bd452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4500 r8:8027f5e8 r7:eb051e60 r6:84943580 r5:8495e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5000 INFO: task kworker/1:651:4757 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a553e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:4758 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3b9d84 r8:00000002 r7:60000113 r6:eb3b9d8c r5:8495ec00 r4:8495ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533d38c r4:8533d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533d38c r4:84bd4580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495ec00 r8:84bd45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4580 r8:8027f5e8 r7:eb095e60 r6:84943600 r5:8495ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5000 INFO: task kworker/1:652:4758 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a553e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:4760 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb395d84 r8:00000002 r7:60000013 r6:eb395d8c r5:852dc800 r4:852dc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852dc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533d78c r4:8533d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533d78c r4:84bd4600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dc800 r8:84bd462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4600 r8:8027f5e8 r7:eb3b9e60 r6:84bd4680 r5:852dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5000 INFO: task kworker/1:653:4760 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a5beb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:4761 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3bdd84 r8:00000002 r7:60000013 r6:eb3bdd8c r5:852d6c00 r4:852d6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852d6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4775000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533df8c r4:8533dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533df8c r4:84bd4700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d6c00 r8:84bd472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4700 r8:8027f5e8 r7:eb395e60 r6:84bd4780 r5:852d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a52c0 INFO: task kworker/1:654:4761 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a5beb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:4763 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3c5d84 r8:00000002 r7:60000013 r6:eb3c5d8c r5:852e0c00 r4:852e0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533db8c r4:8533d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533db8c r4:84bd4800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e0c00 r8:84bd482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4800 r8:8027f5e8 r7:eb3bde60 r6:84bd4880 r5:852e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5500 INFO: task kworker/1:655:4763 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a5beb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:4767 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb055d84 r8:00000002 r7:60000013 r6:eb055d8c r5:8495b000 r4:8495b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea933000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533e38c r4:8533e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533e38c r4:84bd4900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495b000 r8:84bd492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4900 r8:8027f5e8 r7:eb3bde60 r6:84943680 r5:8495b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5740 INFO: task kworker/1:656:4767 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a5d58000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:4769 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:8495c800 r4:8495c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a49c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8495c800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85243b8c r4:85243800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85243b8c r4:84943700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495c800 r8:8494372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84943700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84943700 r8:8027f5e8 r7:eb26de60 r6:84943780 r5:8495c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a4600 INFO: task kworker/0:167:4769 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a5d58000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:4771 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:8495d400 r4:8495d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533ef8c r4:8533ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ef8c r4:84bd4980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495d400 r8:84bd49ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4980 r8:8027f5e8 r7:eb055e60 r6:84943800 r5:8495d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5a00 INFO: task kworker/1:657:4771 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a66dc000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:658:4774 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:658 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3d1d84 r8:00000002 r7:60000013 r6:eb3d1d8c r5:8495bc00 r4:8495bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533e78c r4:8533e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533e78c r4:84bd4a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495bc00 r8:84bd4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4a00 r8:8027f5e8 r7:eb3c1e60 r6:84943880 r5:8495bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5bc0 INFO: task kworker/1:658:4774 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a6bf6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:4775 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:8495a400 r4:8495a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532a740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8495a400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb06b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85243f8c r4:85243c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85243f8c r4:84943900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495a400 r8:8494392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84943900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84943900 r8:8027f5e8 r7:eb26de60 r6:84943980 r5:8495a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a4940 INFO: task kworker/0:168:4775 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a6bf6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:659:4777 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3d9d84 r8:00000002 r7:60000013 r6:eb3d9d8c r5:847f6c00 r4:847f6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5e80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533eb8c r4:8533e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533eb8c r4:84bd4a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f6c00 r8:84bd4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4a80 r8:8027f5e8 r7:eb3c1e60 r6:84943a00 r5:847f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5b00 INFO: task kworker/1:659:4777 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a7118000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:4779 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3ddd84 r8:00000002 r7:60000013 r6:eb3ddd8c r5:847f6000 r4:847f6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beda80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533f38c r4:8533f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533f38c r4:84bd4b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f6000 r8:84bd4b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4b00 r8:8027f5e8 r7:eb3c1e60 r6:84943a80 r5:847f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a5c80 INFO: task kworker/1:660:4779 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a7118000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:4781 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3e5d84 r8:00000002 r7:60000013 r6:eb3e5d8c r5:84740c00 r4:84740c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84740c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a5340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84740c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533f78c r4:8533f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533f78c r4:84bd4b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84740c00 r8:84bd4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4b80 r8:8027f5e8 r7:eb3dde60 r6:84943b00 r5:84740c00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a7394000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaddd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533fb8c r4:8533f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533fb8c r4:84bd4c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e2400 r8:84bd4c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd4c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd4c00 r8:8027f5e8 r7:eb3e5e60 r6:84bd4c80 r5:852e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1080 INFO: task kworker/1:662:4783 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a7394000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:84a53d80 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Call trace: r4:852e1800 r5:852e1800 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaedb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8534438c r4:84bd4d00 r10:61c88647 r9:852e1800 r8:84bd4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1240 INFO: task kworker/1:663:4786 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a77c9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:4787 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:4787 tgid:4787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:852e3000 r4:852e3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1300 r9:83018205 r8:852e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:00001000 r4:eae59000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533ff8c r4:8533fc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:4789 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:852e3c00 r4:852e3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852e3c00 r8:84bd4f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:665:4789 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a77c9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:666 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852e4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85344f8c r4:85344c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85344f8c r4:85316000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e4800 r8:8531602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316000 r8:8027f5e8 r7:eb3f1e60 r6:85316080 r5:852e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1500 INFO: task kworker/1:666:4791 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a7ccc000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:4793 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:852e5400 r4:852e5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf03000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85344b8c r4:85344800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85344b8c r4:85316100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e5400 r8:8531612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316100 r8:8027f5e8 r7:eb3f5e60 r6:85316180 r5:852e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1700 INFO: task kworker/1:667:4793 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a7f37000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85345f8c r4:85316200 Exception stack(0xeb3fdfb0 to 0xeb3fdff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:4797 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb401d84 r8:00000002 r7:60000113 r6:eb401d8c r5:852e6c00 r4:852e6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eaf2d000 r5:8534538c r4:85345000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: dd60: 80230ad4 80239bb0 80000013 ffffffff r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r5:00001000 r4:eaf45000 r7:ddde2d80 r6:83018200 r5:8534578c r4:85316400 r10:61c88647 r9:84741800 r8:8531642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316400 r8:8027f5e8 r7:eb3fde60 r6:84943b80 r5:84741800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1bc0 INFO: task kworker/1:670:4799 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a8915000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf5f000 r5:85345b8c r4:85345800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1c40 INFO: task kworker/1:671:4802 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a8915000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:84740000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534678c r4:85316500 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:673 state:D stack:0 pid:4804 tgid:4804 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84743c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 r5:00001000 r4:eaf85000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84743c00 r8:853165ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316580 r8:8027f5e8 r7:eb41de60 r6:84943d00 r5:84743c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf1d80 INFO: task kworker/1:673:4804 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a8e2c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:4807 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:4807 tgid:4807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb429d84 r8:00000002 r7:60000113 r6:eb429d8c r5:84743000 r4:84743000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84743000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb0a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85346f8c r4:85316600 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:674:4807 is blocked on a mutex likely owned by task kworker/1:205:3669. dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:675:4808 blocked for more than 463 seconds. r4:84745400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r5:00001000 r4:eafb9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb42dfb0 to 0xeb42dff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a920e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:4812 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb431d84 r8:00000002 r7:60000013 r6:eb431d8c r5:84746c00 r4:84746c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84746c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532b340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84746c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534738c r4:85347000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534738c r4:85316700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84746c00 r8:8531672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316700 r8:8027f5e8 r7:eb429e60 r6:84943e80 r5:84746c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8532b340 INFO: task kworker/1:676:4812 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8534778c r4:85316780 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:677:4813 is blocked on a mutex likely owned by task kworker/1:205:3669. Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:4815 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:84890c00 r4:84890c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84890c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532b7c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84890c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85347b8c r4:85347800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85347b8c r4:85316800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:679:4817 blocked for more than 463 seconds. r4:84890000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb147000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85350b8c r4:85316880 Exception stack(0xeb445fb0 to 0xeb445ff8) r4:8532b500 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8609478c r4:86094400 r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb493000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8532ab40 INFO: task kworker/0:169:4818 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a9d67000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:4820 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb44dd84 r8:00000002 r7:60000013 r6:eb44dd8c r5:84893000 r4:84893000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84893000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532ba40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84893000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85347f8c r4:85347c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85347f8c r4:85316900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893000 r8:8531692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa2c6000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb455d84 r8:00000002 r7:60000113 r6:eb455d8c r5:84894800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r5:00001000 r4:eb11f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8535038c r4:85350000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84893c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb12b000 r10:61c88647 r9:84893c00 r8:85316a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:4827 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb469d84 r8:00000002 r7:60000013 r6:eb469d8c r5:84895400 r4:84895400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84895400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532af00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84895400 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85351b8c r4:85351800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85351b8c r4:85316a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84895400 r8:85316aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316a80 r8:8027f5e8 r7:eb445e60 r6:85334300 r5:84895400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8532bac0 INFO: task kworker/1:683:4827 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa8f9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84896000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84896000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:eb151000 r5:85350f8c r4:85350c00 r10:61c88647 r9:84896000 r8:85316b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532bac0 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84896c00 r4:8291892c [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84896c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb167000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535138c r4:85351000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535138c r4:85316c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896c00 r8:85316c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316c00 r8:8027f5e8 r7:eb469e60 r6:85334400 r5:84896c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850a44c0 INFO: task kworker/1:685:4830 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aba8d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:852a0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r5:00001000 r4:dfbe5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316c80 r8:8027f5e8 r7:eb469e60 r6:85334480 r5:852a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8532bf40 INFO: task kworker/1:686:4832 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abd5f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:4837 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:852a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:e03cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535278c r4:85352400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535278c r4:85316d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0c00 r8:85316d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316d00 r8:8027f5e8 r7:eb491e60 r6:85334500 r5:852a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8532bf40 INFO: task kworker/1:687:4837 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abd5f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:688 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:dfdab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:4841 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:4841 tgid:4841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:852a3000 r4:852a3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b9fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e2b8c r4:845e2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e2b8c r4:85334600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a3000 r8:8533462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334600 r8:8027f5e8 r7:eb26de60 r6:85334680 r5:852a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b93c0 INFO: task kworker/0:170:4841 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac0b0000 e03b3000 00000001 80239b98 7f7b1000 00000001 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:689:4843 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4a9d84 r8:00000002 r7:60000013 r6:eb4a9d8c r5:852a4800 r4:852a4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b3400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85352b8c r4:85352800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85352b8c r4:85316e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a4800 r8:85316e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85316e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85316e00 r8:8027f5e8 r7:eb441e60 r6:85334700 r5:852a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b3180 INFO: task kworker/1:689:4843 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac67f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 r5:8609478c r4:86094400 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:690:4844 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4add84 r8:00000002 r7:60000013 r6:eb4add8c r5:852a5400 r4:852a5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b3b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85353f8c r4:85353c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85353f8c r4:85316e80 r10:00000000 r9:85316e80 r8:8027f5e8 r7:eb4a9e60 r6:85334780 r5:852a5400 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8789000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb409fb0 to 0xeb409ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:692:4847 blocked for more than 464 seconds. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535338c r4:85353000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535338c r4:853b6000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84746000 r8:853b602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6000 r8:8027f5e8 r7:eb4ade60 r6:853b6080 r5:84746000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b3380 INFO: task kworker/1:692:4847 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: acbb4000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:4849 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea9f5000 r7:ddde2d80 r6:83018200 r5:8535378c r4:853b6100 r4:853b3500 Exception stack(0xe055dd28 to 0xe055dd70) r4:e055ddc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:694:4851 blocked for more than 464 seconds. r4:852e8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b39c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85353b8c r4:85353800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85353b8c r4:853b6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8000 r8:853b622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6200 r8:8027f5e8 r7:eb4ade60 r6:853b6280 r5:852e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b3900 INFO: task kworker/1:694:4851 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 task:kworker/1:695 state:D stack:0 pid:4855 tgid:4855 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae0f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852e8c00 r8:853b632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:4856 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb20dd84 r8:00000002 r7:60000013 r6:eb20dd8c r5:852e9800 r4:852e9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb01f000 r4:853b6400 r4:853b3a80 r4:00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b3e00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535478c r4:85354400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535478c r4:853b6500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:853b652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6500 r8:8027f5e8 r7:eb20de60 r6:853b6580 r5:852ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b3a80 INFO: task kworker/1:697:4857 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad8de000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:4860 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:4860 tgid:4860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:852eb000 r4:852eb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852eb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r5:00001000 r4:eafe5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852eb000 r8:853b662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:699 state:D stack:0 pid:4862 tgid:4862 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85355b8c r4:85355800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85355b8c r4:853b6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ebc00 r8:853b672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6700 r8:8027f5e8 r7:eb20de60 r6:853b6780 r5:852ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8000 INFO: task kworker/1:699:4862 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adc4d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:4864 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4cdd84 r8:00000002 r7:60000013 r6:eb4cdd8c r5:852ed400 r4:852ed400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ed400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb033000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) INFO: task kworker/1:700:4864 is blocked on a mutex likely owned by task kworker/1:205:3669. dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8880 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535578c r4:85355400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535578c r4:853b6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ee000 r8:853b692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6900 r8:8027f5e8 r7:eb4d1e60 r6:853b6980 r5:852ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8180 INFO: task kworker/1:701:4865 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ae0f8000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Not tainted 6.15.0-syzkaller #0 r4:852f0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r5:00001000 r4:eb1c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:845e1f8c r4:85334800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:702 state:D stack:0 pid:4871 tgid:4871 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852f2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8200 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535638c r4:85356000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535638c r4:853b6a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f2400 r8:853b6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b6a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b6a80 r8:8027f5e8 r7:eb4d1e60 r6:853b6b00 r5:852f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8840 INFO: task kworker/1:702:4871 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ae8fd000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:703 state:D stack:0 pid:4872 tgid:4872 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:4874 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:852f3c00 r4:852f3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d68c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb369000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538378c r4:85383400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538378c r4:85334880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3c00 r8:853348ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334880 r8:8027f5e8 r7:eb26de60 r6:853b6c80 r5:852f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b9d00 INFO: task kworker/0:172:4874 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb65000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:4875 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:852f4800 r4:852f4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb211000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852f4800 r8:8533492c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 task:kworker/0:174 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:852f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:00001000 r4:eb10b000 r7:dddced80 r6:83018000 r5:85380f8c r4:85334980 Exception stack(0xeb501fb0 to 0xeb501ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b9a80 INFO: task kworker/0:174:4877 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aee83000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4879 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:852f1800 r4:852f1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eb249000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb505fb0 to 0xeb505ff8) r4:853c8e80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:4881 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb509d84 r8:00000002 r7:60000113 r6:eb509d8c r5:852f5400 r4:852f5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bcd80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 r5:00001000 r4:eb2cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852f5400 r8:853b6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:706 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852f6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb257000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85356b8c r4:85356800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85356b8c r4:853bd000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6000 r8:853bd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bd000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bd000 r8:8027f5e8 r7:eb509e60 r6:853bd080 r5:852f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bc100 INFO: task kworker/1:706:4883 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af95e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:707 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r5:00001000 r4:eb26f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85356f8c r4:853bd100 Exception stack(0xeb511fb0 to 0xeb511ff8) r4:853bc340 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:708 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535738c r4:85357000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535738c r4:853bd180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a6c00 r8:853bd1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bd180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bd180 r8:8027f5e8 r7:eb509e60 r6:85334a80 r5:852a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bc340 INFO: task kworker/1:708:4887 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: afa24000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:4889 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc740 r5:00001000 r4:eb28b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:852f6c00 r8:853bd22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:4892 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:852ec800 r4:852ec800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ec800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bc900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85357b8c r4:85357800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85357b8c r4:853bd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ec800 r8:853bd32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r4:00000001 INFO: task kworker/1:711:4893 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r4:852eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bca00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85357f8c r4:85357c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85357f8c r4:853bd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eec00 r8:853bd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bd400 r8:8027f5e8 r7:eb509e60 r6:853bd480 r5:852eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bc780 INFO: task kworker/1:711:4893 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b01f2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb521d84 r8:00000002 r7:60000013 r6:eb521d8c r5:852f8000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bcbc0 r5:00001000 r4:eb2b7000 r5:8536038c r4:85360000 r10:61c88647 r9:852f8000 r8:853bd52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bcb00 INFO: task kworker/1:712:4896 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0444000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:4898 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:713 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb2d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85360b8c r4:85360800 r10:61c88647 r9:852f8c00 r8:853bd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:852f9800 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb2e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853bd700 r8:8027f5e8 r7:eb529e60 r6:853bd780 r5:852f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bcc80 INFO: task kworker/1:714:4900 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0444000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:4902 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb531d84 r8:00000002 r7:60000113 r6:eb531d8c r5:852fa400 r4:852fa400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fa400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb2fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8536138c r4:853bd800 Exception stack(0xeb531fb0 to 0xeb531ff8) INFO: task kworker/1:715:4902 is blocked on a mutex likely owned by task kworker/1:205:3669. Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:4903 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:852fb000 r4:852fb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb309000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536178c r4:85361400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536178c r4:853bd900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fb000 r8:853bd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bd900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bd900 r8:8027f5e8 r7:eb531e60 r6:853bd980 r5:852fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bcc80 INFO: task kworker/1:716:4903 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:852fbc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 r5:00001000 r4:eb317000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:4908 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:852fc800 r4:852fc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd09000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536238c r4:85362000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536238c r4:853bdb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fc800 r8:853bdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bdb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bdb00 r8:8027f5e8 r7:eb535e60 r6:853bdb80 r5:852fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d7100 INFO: task kworker/1:718:4908 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0df8000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:4909 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:4909 tgid:4909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:852fd400 r4:852fd400 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:852fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 r5:00001000 r4:dfa29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:852fd400 r8:853bdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 task:kworker/1:720 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:852fe000 r4:852fe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852fe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536278c r4:85362400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536278c r4:853bdd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fe000 r8:853bdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bdd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bdd00 r8:8027f5e8 r7:eb53de60 r6:853bdd80 r5:852fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d7400 INFO: task kworker/1:720:4912 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b11f0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:4915 blocked for more than 465 seconds. task:kworker/1:721 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 r5:00001000 r4:e037d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:722:4916 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:722 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:853f0000 r4:853f0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85362f8c r4:85362c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85362f8c r4:853bdf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f0000 r8:853bdf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853bdf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853bdf00 r8:8027f5e8 r7:eb411e60 r6:853bdf80 r5:853f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d76c0 INFO: task kworker/1:722:4916 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b11f0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e055ddc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:853f0c00 r5:853f0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536338c r4:85363000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536338c r4:853e3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f0c00 r8:853e302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3000 r8:8027f5e8 r7:eb461e60 r6:853e3080 r5:853f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb465fb0 to 0xeb465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d7900 INFO: task kworker/1:723:4919 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1754000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb4a1d84 r8:00000002 r7:60000113 r6:eb4a1d8c r5:853f1800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea92f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536378c r4:853e3100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f1800 r8:853e312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3100 r8:8027f5e8 r7:eb465e60 r6:853e3180 r5:853f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d7a40 INFO: task kworker/1:724:4921 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1754000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:725 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eabc9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) INFO: task kworker/1:725:4922 is blocked on a mutex likely owned by task kworker/1:205:3669. Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:726 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r5:00001000 r4:ead6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d7d80 INFO: task kworker/1:726:4924 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1e9d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:4925 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:852a3c00 r4:852a3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec040 r9:83018205 r8:852a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:00001000 r4:eac29000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852a3c00 r8:853e33ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 task:kworker/1:728 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r5:00001000 r4:eac8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ec200 INFO: task kworker/1:728:4927 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b216d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:4930 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:852b8000 r4:852b8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536cf8c r4:8536cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536cf8c r4:853e3480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b8000 r8:853e34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3480 r8:8027f5e8 r7:eb549e60 r6:85334c80 r5:852b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:4932 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:852b9800 r4:852b9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536cb8c r4:8536c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536cb8c r4:853e3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b9800 r8:853e352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3500 r8:8027f5e8 r7:eb55de60 r6:85334d00 r5:852b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ec340 INFO: task kworker/1:730:4932 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2547000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:4935 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:852bbc00 r4:852bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ecc80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf33000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536df8c r4:8536dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536df8c r4:853e3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bbc00 r8:853e35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3580 r8:8027f5e8 r7:eb55de60 r6:85334d80 r5:852bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ec580 INFO: task kworker/1:731:4935 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b29eb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:4936 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:852bc800 r4:852bc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852bc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ec800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536d38c r4:8536d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536d38c r4:853e3600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bc800 r8:853e362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3600 r8:8027f5e8 r7:eb56de60 r6:85334e00 r5:852bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ec580 INFO: task kworker/1:732:4936 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b29eb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:853f4800 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaef3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853f4800 r8:853e36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:4940 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:853f5400 r4:853f5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ecb00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536db8c r4:8536d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536db8c r4:853e3780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f5400 r8:853e37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3780 r8:8027f5e8 r7:eb56de60 r6:853e3800 r5:853f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb575fb0 to 0xeb575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ec840 INFO: task kworker/1:734:4940 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2f77000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:4942 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb579d84 r8:00000002 r7:60000013 r6:eb579d8c r5:853f6000 r4:853f6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ecdc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536e38c r4:8536e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536e38c r4:853e3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f6000 r8:853e38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3880 r8:8027f5e8 r7:eb56de60 r6:853e3900 r5:853f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853eca80 INFO: task kworker/1:735:4942 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b32a0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eaf97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8536eb8c r4:8536e800 r10:61c88647 r9:853f6c00 r8:853e39ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536e78c r4:8536e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536e78c r4:853e3a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3000 r8:853e3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3a80 r8:8027f5e8 r7:eb57de60 r6:853e3b00 r5:853f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ece00 INFO: task kworker/1:737:4947 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3686000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:738:4948 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:738 state:D stack:0 pid:4948 tgid:4948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:853f3c00 r4:853f3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c5340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536ef8c r4:8536ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536ef8c r4:853e3b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3c00 r8:853e3bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3b80 r8:8027f5e8 r7:eb57de60 r6:853e3c00 r5:853f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ece00 INFO: task kworker/1:738:4948 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3e23000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:739:4950 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb589d84 r8:00000002 r7:60000013 r6:eb589d8c r5:853f8000 r4:853f8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536f38c r4:8536f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536f38c r4:853e3c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8000 r8:853e3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3c80 r8:8027f5e8 r7:eb585e60 r6:853e3d00 r5:853f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946000 INFO: task kworker/1:739:4950 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3fad000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:4952 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb58dd84 r8:00000002 r7:60000013 r6:eb58dd8c r5:853f9800 r4:853f9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb097000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536f78c r4:8536f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536f78c r4:853e3d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f9800 r8:853e3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3d80 r8:8027f5e8 r7:eb589e60 r6:853e3e00 r5:853f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946000 INFO: task kworker/1:740:4952 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b420a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:4954 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb591d84 r8:00000002 r7:60000013 r6:eb591d8c r5:853fb000 r4:853fb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536fb8c r4:8536f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536fb8c r4:853e3e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fb000 r8:853e3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3e80 r8:8027f5e8 r7:eb58de60 r6:853e3f00 r5:853fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946280 INFO: task kworker/1:741:4954 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b43f1000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:4955 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:853fbc00 r4:853fbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542878c r4:85428400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542878c r4:853e3f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fbc00 r8:853e3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e3f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e3f80 r8:8027f5e8 r7:eb591e60 r6:85334e80 r5:853fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946480 INFO: task kworker/1:742:4955 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b46b2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:4957 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:852ba400 r4:852ba400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ba400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536ff8c r4:8536fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8536ff8c r4:848cc000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ba400 r8:848cc02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc000 r8:8027f5e8 r7:eb595e60 r6:85334f00 r5:852ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946480 INFO: task kworker/1:743:4957 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b46b2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:4960 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:852bd400 r4:852bd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852bd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9adc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb367000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538138c r4:85381000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538138c r4:85334f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bd400 r8:85334fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334f80 r8:8027f5e8 r7:eb4f5e60 r6:8493d000 r5:852bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a9a440 INFO: task kworker/0:175:4960 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b4943000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:4963 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:852bec00 r4:852bec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852bec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb133000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542838c r4:85428000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542838c r4:848cc080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bec00 r8:848cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc080 r8:8027f5e8 r7:eb595e60 r6:8493d080 r5:852bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849469c0 INFO: task kworker/1:744:4963 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b4943000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:4965 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:4965 tgid:4965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:852b8c00 r4:852b8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946f40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb337000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85428f8c r4:85428c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85428f8c r4:848cc100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b8c00 r8:848cc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc100 r8:8027f5e8 r7:eb595e60 r6:8493d100 r5:852b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849469c0 INFO: task kworker/1:745:4965 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b4cda000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:746:4966 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb59dd84 r8:00000002 r7:60000013 r6:eb59dd8c r5:853f8c00 r4:853f8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853f8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb161000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85428b8c r4:85428800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85428b8c r4:848cc180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8c00 r8:848cc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc180 r8:8027f5e8 r7:eb5b1e60 r6:848cc200 r5:853f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946d80 INFO: task kworker/1:746:4966 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b50b0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:4969 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5b5d84 r8:00000002 r7:60000013 r6:eb5b5d8c r5:853fc800 r4:853fc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84946700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb345000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542938c r4:85429000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542938c r4:848cc280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fc800 r8:848cc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc280 r8:8027f5e8 r7:eb5b1e60 r6:848cc300 r5:853fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946c00 INFO: task kworker/1:747:4969 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b50b0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:748:4972 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:853fd400 r4:853fd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb353000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542978c r4:85429400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542978c r4:848cc380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fd400 r8:848cc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc380 r8:8027f5e8 r7:eb5b5e60 r6:848cc400 r5:853fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946f00 INFO: task kworker/1:748:4972 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b54d5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:4973 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:853fe000 r4:853fe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138140 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb375000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85429b8c r4:85429800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85429b8c r4:848cc480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fe000 r8:848cc4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc480 r8:8027f5e8 r7:eb5b9e60 r6:848cc500 r5:853fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84946f00 INFO: task kworker/1:749:4973 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b54d5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:4976 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:85400000 r4:85400000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85400000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851386c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542a38c r4:8542a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542a38c r4:848cc580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400000 r8:848cc5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc580 r8:8027f5e8 r7:eb5bde60 r6:848cc600 r5:85400000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138100 INFO: task kworker/1:750:4976 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b57c9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:4977 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:85400c00 r4:85400c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85400c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851385c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85400c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85429f8c r4:85429c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85429f8c r4:848cc680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400c00 r8:848cc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc680 r8:8027f5e8 r7:eb5c5e60 r6:848cc700 r5:85400c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138100 INFO: task kworker/1:751:4977 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b57c9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4978 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:4978 tgid:4978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5cdd84 r8:00000002 r7:60000113 r6:eb5cdd8c r5:85401800 r4:85401800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85401800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9afc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85401800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85381b8c r4:85381800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85381b8c r4:8493d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85401800 r8:8493d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8493d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493d180 r8:8027f5e8 r7:eb4f5e60 r6:848cc780 r5:85401800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a9ac40 INFO: task kworker/0:176:4978 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b5d0e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:4980 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:85403c00 r4:85403c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85403c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85403c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542ab8c r4:8542a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542ab8c r4:848cc800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403c00 r8:848cc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc800 r8:8027f5e8 r7:eb5c5e60 r6:848cc880 r5:85403c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851384c0 INFO: task kworker/1:752:4980 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b5d0e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:4984 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:85404800 r4:85404800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85404800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851389c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0395000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542a78c r4:8542a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542a78c r4:848cc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85404800 r8:848cc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cc900 r8:8027f5e8 r7:eb4dde60 r6:848cc980 r5:85404800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138840 INFO: task kworker/1:753:4984 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6053000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:4986 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:4986 tgid:4986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:85403000 r4:85403000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85403000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85403000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542b38c r4:8542b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542b38c r4:848cca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403000 r8:848cca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cca00 r8:8027f5e8 r7:eb4dde60 r6:848cca80 r5:85403000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138a40 INFO: task kworker/1:754:4986 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b648e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:4988 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5c1d84 r8:00000002 r7:60000113 r6:eb5c1d8c r5:849f8c00 r4:849f8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85159040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85381f8c r4:85381c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85381f8c r4:8493d200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f8c00 r8:8493d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8493d200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493d200 r8:8027f5e8 r7:eb4f5e60 r6:8493d280 r5:849f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a9ad40 INFO: task kworker/0:177:4988 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b648e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:4990 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:849f8000 r4:849f8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542af8c r4:8542ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542af8c r4:848ccb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f8000 r8:848ccb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccb00 r8:8027f5e8 r7:eb5d9e60 r6:8493d300 r5:849f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138cc0 INFO: task kworker/1:755:4990 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b648e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:4992 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:849fb000 r4:849fb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849fb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945200 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542b78c r4:8542b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542b78c r4:848ccb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fb000 r8:848ccbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccb80 r8:8027f5e8 r7:eb5d9e60 r6:8493d380 r5:849fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138e80 INFO: task kworker/1:756:4992 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b648e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:4994 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5edd84 r8:00000002 r7:60000013 r6:eb5edd8c r5:849fc800 r4:849fc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849fc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c5580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542bb8c r4:8542b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542bb8c r4:848ccc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fc800 r8:848ccc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccc00 r8:8027f5e8 r7:eb5e5e60 r6:8493d400 r5:849fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945440 INFO: task kworker/1:757:4994 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b681e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:4995 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5f1d84 r8:00000002 r7:60000113 r6:eb5f1d8c r5:849fa400 r4:849fa400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849fa400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85430f8c r4:85430c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85430f8c r4:848ccc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fa400 r8:848cccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccc80 r8:8027f5e8 r7:eb5ede60 r6:8493d480 r5:849fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945440 INFO: task kworker/1:758:4995 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6b2c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:4998 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:849fd400 r4:849fd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849fd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542bf8c r4:8542bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542bf8c r4:848ccd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fd400 r8:848ccd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccd00 r8:8027f5e8 r7:eb5f1e60 r6:8493d500 r5:849fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85138500 INFO: task kworker/1:759:4998 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6b2c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4999 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:849fe000 r4:849fe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849fe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85159200 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538238c r4:85382000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538238c r4:8493d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fe000 r8:8493d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8493d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493d580 r8:8027f5e8 r7:eb4f5e60 r6:8493d600 r5:849fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851590c0 INFO: task kworker/0:178:4999 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6e06000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5002 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb601d84 r8:00000002 r7:60000013 r6:eb601d8c r5:849f9800 r4:849f9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543038c r4:85430000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543038c r4:848ccd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f9800 r8:848ccdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccd80 r8:8027f5e8 r7:eb5f1e60 r6:8493d680 r5:849f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be51c0 INFO: task kworker/1:760:5002 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7062000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5003 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb605d84 r8:00000002 r7:60000113 r6:eb605d8c r5:849fec00 r4:849fec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849fec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543078c r4:85430400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543078c r4:848cce00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fec00 r8:848cce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cce00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cce00 r8:8027f5e8 r7:eb5f1e60 r6:8493d700 r5:849fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5140 INFO: task kworker/1:761:5003 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:762:5006 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r4:849fbc00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85430b8c r4:85430800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85430b8c r4:848cce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849fbc00 r8:848cceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cce80 r8:8027f5e8 r7:eb5f1e60 r6:8493d780 r5:849fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be52c0 INFO: task kworker/1:762:5006 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b71b0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a51100 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:852be000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85431b8c r4:85431800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85431b8c r4:848ccf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852be000 r8:848ccf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ccf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ccf00 r8:8027f5e8 r7:eb5f1e60 r6:8493d800 r5:852be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5340 INFO: task kworker/1:763:5007 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7451000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:852bb000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5800 r5:00001000 r4:eb20f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852bb000 r8:848ccfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb619fb0 to 0xeb619ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:765 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543178c r4:85431400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543178c r4:85154000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c8000 r8:8515402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154000 r8:8027f5e8 r7:eb615e60 r6:8493d900 r5:849c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5580 INFO: task kworker/1:765:5011 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7ac5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5014 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb625d84 r8:00000002 r7:60000013 r6:eb625d8c r5:849c9800 r4:849c9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5f40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb293000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85432b8c r4:85432800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85432b8c r4:85154080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c9800 r8:851540ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154080 r8:8027f5e8 r7:eb615e60 r6:8493d980 r5:849c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be59c0 INFO: task kworker/1:766:5014 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7ac5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5015 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:849ca400 r4:849ca400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ca400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb255000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85431f8c r4:85431c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85431f8c r4:85154100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:8515412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154100 r8:8027f5e8 r7:eb625e60 r6:8493da00 r5:849ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be59c0 INFO: task kworker/1:767:5015 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7ac5000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5017 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb631d84 r8:00000002 r7:60000013 r6:eb631d8c r5:849cbc00 r4:849cbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb271000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543238c r4:85432000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543238c r4:85154180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cbc00 r8:851541ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154180 r8:8027f5e8 r7:eb625e60 r6:8493da80 r5:849cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5640 INFO: task kworker/1:768:5017 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7da7000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:5020 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:849cb000 r4:849cb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be5e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb287000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543278c r4:85432400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543278c r4:85154200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cb000 r8:8515422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154200 r8:8027f5e8 r7:eb625e60 r6:8493db00 r5:849cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5640 INFO: task kworker/1:769:5020 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b7da7000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5022 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:849cc800 r4:849cc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85432f8c r4:85432c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85432f8c r4:85154280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cc800 r8:851542ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154280 r8:8027f5e8 r7:eb625e60 r6:8493db80 r5:849cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5d40 INFO: task kworker/1:770:5022 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b83fe000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:ee509000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:771 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:849cd400 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb315000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85433f8c r4:85433c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85433f8c r4:85154300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cd400 r8:8515432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154300 r8:8027f5e8 r7:eb641e60 r6:8493dc00 r5:849cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126100 INFO: task kworker/1:771:5024 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b83fe000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb2c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8543338c r4:85154380 Exception stack(0xeb649fb0 to 0xeb649ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:773 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849cec00 r8:8515442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126100 INFO: task kworker/1:773:5027 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b880b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5030 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:849c8c00 r4:849c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85433b8c r4:85433800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85433b8c r4:85154480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c8c00 r8:851544ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154480 r8:8027f5e8 r7:eb645e60 r6:8493dd80 r5:849c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:775 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:5034 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:849c1800 r4:849c1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126880 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb397000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543438c r4:85434000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543438c r4:85154580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:851545ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154580 r8:8027f5e8 r7:eb659e60 r6:8493de80 r5:849c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126540 INFO: task kworker/1:776:5034 is blocked on a mutex likely owned by task kworker/1:205:3669. Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:179 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849c2400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb495000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb661fb0 to 0xeb661ff8) r4:84be7040 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5038 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:849c3000 r4:849c3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543478c r4:85434400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543478c r4:85154600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3000 r8:8515462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154600 r8:8027f5e8 r7:eb659e60 r6:84bdc000 r5:849c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126900 INFO: task kworker/1:777:5038 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b916b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85405400 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb413000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85434f8c r4:85434c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85434f8c r4:85154680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85405400 r8:851546ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154680 r8:8027f5e8 r7:eb659e60 r6:85154700 r5:85405400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126b80 INFO: task kworker/1:778:5040 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b916b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5041 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:85406c00 r4:85406c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85406c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126f40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb437000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543538c r4:85435000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543538c r4:85154780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406c00 r8:851547ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154780 Exception stack(0xeb60dfb0 to 0xeb60dff8) r4:85126ac0 INFO: task kworker/1:779:5041 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb457000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8543578c r4:85154880 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85126940 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:781 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb66dd84 r8:00000002 r7:60000013 r6:eb66dd8c r5:85402400 r4:85402400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85402400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85402400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543638c r4:85436000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543638c r4:85154980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85402400 r8:851549ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154980 r8:8027f5e8 r7:eb669e60 r6:85154a00 r5:85402400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126e40 INFO: task kworker/1:781:5045 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b99c2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:782 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb4df000 r5:85435b8c r4:85435800 r10:61c88647 r9:853fa400 r8:85154aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb5ddd84 r8:00000002 r7:60000113 r6:eb5ddd8c r5:849c3c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb4af000 r5:85382b8c r4:85382800 r10:61c88647 r9:849c3c00 r8:84bdc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84bdc080 r8:8027f5e8 r7:eb4f5e60 r6:84bdc100 r5:849c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be73c0 INFO: task kworker/0:180:5050 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b9eda000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5051 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5051 tgid:5051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb675d84 r8:00000002 r7:60000013 r6:eb675d8c r5:849c4800 r4:849c4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85435f8c r4:85435c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85435f8c r4:85154b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c4800 r8:85154bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154b80 r8:8027f5e8 r7:eb66de60 r6:84bdc180 r5:849c4800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:8609478c r4:86094400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a51100 task:kworker/1:784 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb565d84 r8:00000002 r7:60000113 r6:eb565d8c r5:849c5400 r4:849c5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543738c r4:85437000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543738c r4:85154c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:85154c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154c00 r8:8027f5e8 r7:eb66de60 r6:84bdc200 r5:849c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c5080 INFO: task kworker/1:784:5054 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ba0ff000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a51100 task:kworker/1:785 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r5:00001000 r4:e069d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8543678c r4:85436400 r4:85154c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:786:5060 blocked for more than 466 seconds. r10:82918930 r9:eb685d84 r8:00000002 r7:60000113 r6:eb685d8c r5:849c0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c57c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85436b8c r4:85436800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85436b8c r4:85154d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:85154d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154d00 r8:8027f5e8 r7:eb565e60 r6:84bdc300 r5:849c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c55c0 INFO: task kworker/1:786:5060 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ba88f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:787:5061 blocked for more than 466 seconds. r4:84808000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85436f8c r4:85436c00 r10:61c88647 r9:84808000 r8:85154dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:5063 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:5063 tgid:5063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:84809800 r4:84809800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84809800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84809800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543778c r4:85437400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543778c r4:85154e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84809800 r8:85154e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154e00 r8:8027f5e8 r7:eb565e60 r6:84bdc400 r5:84809800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c56c0 INFO: task kworker/1:788:5063 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bab27000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:789:5065 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:789 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:8480b000 r4:8480b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85138600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440b8c r4:85440800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85440b8c r4:85154e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r5:8609478c r4:86094400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5067 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:8480a400 r4:8480a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85437b8c r4:85437800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85437b8c r4:85154f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480a400 r8:85154f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154f00 r8:8027f5e8 r7:eb699e60 r6:84bdc500 r5:8480a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c59c0 INFO: task kworker/1:790:5067 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: baf82000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:5069 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:8480c800 r4:8480c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d6800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8480c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb351000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538338c r4:85383000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538338c r4:84bdc580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480c800 r8:84bdc5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdc580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc580 r8:8027f5e8 r7:eb4f5e60 r6:84bdc600 r5:8480c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7ec0 INFO: task kworker/0:181:5069 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb1cf000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5070 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:84808c00 r4:84808c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84808c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5e00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84808c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85437f8c r4:85437c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85437f8c r4:85154f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84808c00 r8:85154fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85154f80 r8:8027f5e8 r7:eb699e60 r6:84bdc680 r5:84808c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c5b00 INFO: task kworker/1:791:5070 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb618000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5073 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:8480bc00 r4:8480bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5f00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544038c r4:85440000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544038c r4:85145000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480bc00 r8:8514502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145000 r8:8027f5e8 r7:eb699e60 r6:84bdc700 r5:8480bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c5c00 INFO: task kworker/1:792:5073 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb999000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5074 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5074 tgid:5074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:8480ec00 r4:8480ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c53c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544078c r4:85440400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544078c r4:85145080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480ec00 r8:851450ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145080 r8:8027f5e8 r7:eb699e60 r6:84bdc780 r5:8480ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c5d00 INFO: task kworker/1:793:5074 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bb999000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5076 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6c5d84 r8:00000002 r7:60000113 r6:eb6c5d8c r5:8480e000 r4:8480e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d17c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544238c r4:85442000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544238c r4:85145100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480e000 r8:8514512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145100 r8:8027f5e8 r7:eb699e60 r6:84bdc800 r5:8480e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c5f80 INFO: task kworker/1:794:5076 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bbba1000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5078 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:8480d400 r4:8480d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c5fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf51000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440f8c r4:85440c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85440f8c r4:85145180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480d400 r8:851451ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145180 r8:8027f5e8 r7:eb6c5e60 r6:84bdc880 r5:8480d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7980 INFO: task kworker/1:795:5078 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bbd8b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5081 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6d9d84 r8:00000002 r7:60000013 r6:eb6d9d8c r5:85468000 r4:85468000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85468000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85468000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544138c r4:85441000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544138c r4:85145200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85468000 r8:8514522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145200 r8:8027f5e8 r7:eb6c5e60 r6:84bdc900 r5:85468000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1080 INFO: task kworker/1:796:5081 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc36e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:797:5082 blocked for more than 467 seconds. r10:82918930 r9:eb67dd84 r8:00000002 r7:60000013 r6:eb67dd8c r5:85409800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eafab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8544178c r4:85145280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85409800 r8:851452ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145280 r8:8027f5e8 r7:eb6c5e60 r6:85145300 r5:85409800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb67dfb0 to 0xeb67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1200 INFO: task kworker/1:797:5082 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bc36e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb06d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5087 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:8540b000 r4:8540b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d15c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r4:00000000 r9:83018205 r8:8540c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85145580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145580 r8:8027f5e8 r7:eb6c5e60 r6:85145600 r5:8540c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6ddfb0 to 0xeb6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1640 INFO: task kworker/1:800:5089 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bcd69000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r5:00001000 r4:eb149000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1500 INFO: task kworker/1:801:5090 is blocked on a mutex likely owned by task kworker/1:205:3669. r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb127000 r5:85442b8c r4:85442800 r4:85145780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145780 r8:8027f5e8 r7:eb6e1e60 r6:85145800 r5:8540bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d14c0 INFO: task kworker/1:802:5092 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bcd69000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6edd84 r8:00000002 r7:60000013 r6:eb6edd8c r5:8540d400 r4:8540d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb33b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bcf6e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5097 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6f1d84 r8:00000002 r7:60000113 r6:eb6f1d8c r5:85408000 r4:85408000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85408000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1f40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85408000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544338c r4:85443000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85145980 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe055dfb0 to 0xe055dff8) r10:82918930 r9:eb6e5d84 r8:00000002 r7:60000013 r6:eb6e5d8c r5:8540ec00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb545000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85443f8c r4:85443c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85443f8c r4:85145a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540ec00 r8:85145aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145a80 r8:8027f5e8 r7:eb6ede60 r6:85145b00 r5:8540ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be5fc0 INFO: task kworker/1:805:5099 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bd756000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5100 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6f9d84 r8:00000002 r7:60000113 r6:eb6f9d8c r5:8540e000 r4:8540e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8540e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540e000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85443b8c r4:85443800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85443b8c r4:85145b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540e000 r8:85145bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145b80 r8:8027f5e8 r7:eb6e5e60 r6:85145c00 r5:8540e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85126f80 INFO: task kworker/1:806:5100 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bd756000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r5:00001000 r4:ee509000 r5:8609478c r4:86094400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:5103 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:85410c00 r4:85410c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85410c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d6a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85383b8c r4:85383800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85383b8c r4:84bdc980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85410c00 r8:84bdc9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdc980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc980 r8:8027f5e8 r7:eb4f5e60 r6:85145c80 r5:85410c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85412400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r5:00001000 r4:eaec7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853d6880 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:5106 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb711d84 r8:00000002 r7:60000113 r6:eb711d8c r5:85413000 r4:85413000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85413000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85329600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85413000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85456b8c r4:85456800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85456b8c r4:84bdca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdca80 Exception stack(0xeb711fb0 to 0xeb711ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd20: bdf49000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:807:5109 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:807 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:85413c00 r4:85413c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85413c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85413c00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544838c r4:85448000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544838c r4:85145e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85413c00 r8:85145e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85145e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145e00 r8:8027f5e8 r7:eb6e5e60 r6:85145e80 r5:85413c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85330580 INFO: task kworker/1:807:5109 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: be39d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc87000 r5:8544878c r4:85448400 r4:85145f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5113 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb709d84 r8:00000002 r7:60000013 r6:eb709d8c r5:85415400 r4:85415400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85415400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330e00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85415400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448f8c r4:85448c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85448f8c r4:8511e000 r10:61c88647 r9:85415400 r8:8511e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:00001000 r4:ee509000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:85416000 r4:8291892c r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85416000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e040f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448b8c r4:85448800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85448b8c r4:8511e100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85416000 r8:8511e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511e100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511e100 r8:8027f5e8 r7:eb709e60 r6:8511e180 r5:85416000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85330a80 INFO: task kworker/1:810:5114 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bebdb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:5117 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5f9d84 r8:00000002 r7:60000013 r6:eb5f9d8c r5:85416c00 r4:85416c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85416c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330f00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85416c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 r5:00001000 r4:ea9d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8544938c r4:85449000 r4:8511e200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85330c80 INFO: task kworker/1:811:5117 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bebdb000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:84a51100 r4:85411800 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5120 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:853fec00 r4:853fec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853fec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:00001000 r4:eaab5000 r4:8511e400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:814 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae11000 r5:85449b8c r4:85449800 r4:8511e500 Exception stack(0xeb71dfb0 to 0xeb71dff8) r4:84bf20c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5124 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb719d84 r8:00000002 r7:60000013 r6:eb719d8c r5:85419800 r4:85419800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85419800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf23c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85419800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449f8c r4:85449c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85449f8c r4:8511e600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85419800 r8:8511e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511e600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511e600 r8:8027f5e8 r7:eb715e60 r6:8511e680 r5:85419800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf2000 INFO: task kworker/1:815:5124 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r5:00001000 r4:eb205000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bf49a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5129 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb729d84 r8:00000002 r7:60000013 r6:eb729d8c r5:8541b000 r4:8541b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf2680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb179000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a78c r4:8544a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544a78c r4:8511e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541b000 r8:8511e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511e800 r8:8027f5e8 r7:eb725e60 r6:8511e880 r5:8541b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: bf8c2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:5131 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb72dd84 r8:00000002 r7:60000013 r6:eb72dd8c r5:8541bc00 r4:8541bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf27c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544ab8c r4:8544a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544ab8c r4:8511e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541bc00 r8:8511e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511e900 r8:8027f5e8 r7:eb725e60 r6:8511e980 r5:8541bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf2640 INFO: task kworker/1:818:5131 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb221000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:ee509000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8541d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf2dc0 r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb265000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bb8c r4:8544b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544bb8c r4:8511eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541d400 r8:8511eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511eb00 r8:8027f5e8 r7:eb721e60 r6:8511eb80 r5:8541d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf29c0 INFO: task kworker/1:820:5135 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c009f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5138 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb739d84 r8:00000002 r7:60000113 r6:eb739d8c r5:8541e000 r4:8541e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf2c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb247000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b78c r4:8544b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544b78c r4:8511ec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541e000 r8:8511ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511ec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511ec00 r8:8027f5e8 r7:eb735e60 r6:8511ec80 r5:8541e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf2b00 INFO: task kworker/1:821:5138 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0396000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:5139 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:8541ec00 r4:8541ec00 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8541ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:00001000 r4:eb2b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8545478c r4:85454400 r10:61c88647 r9:8541ec00 r8:8511ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a53d80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a51100 Not tainted 6.15.0-syzkaller #0 task:kworker/1:823 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85418000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27f000 r5:8544bf8c r4:8544bc00 r10:61c88647 r9:85418000 r8:8511ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511ee00 r8:8027f5e8 r7:eb73de60 r6:8511ee80 r5:85418000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85337080 INFO: task kworker/1:823:5142 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0396000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5143 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb745d84 r8:00000002 r7:60000013 r6:eb745d8c r5:85410000 r4:85410000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85410000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85410000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545438c r4:85454000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8545438c r4:8511ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85410000 r8:8511ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8511ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8511ef00 r8:8027f5e8 r7:eb73de60 r6:8511ef80 r5:85410000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85337080 INFO: task kworker/1:824:5143 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0b02000 e03b3000 00000001 80239b98 7f7b1000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:8609478c r4:86094400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:825 state:D stack:0 pid:5145 tgid:5145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:85420000 r4:85420000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85420000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853374c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85420000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454b8c r4:85454800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85454b8c r4:853d2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85420000 r8:853d202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d2000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2000 r8:8027f5e8 r7:eb73de60 r6:853d2080 r5:85420000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85337200 INFO: task kworker/1:825:5145 is blocked on a mutex likely owned by task kworker/1:205:3669. Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337640 r5:00001000 r4:eb2f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454f8c r4:85454c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85454f8c r4:853d2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85420c00 r8:853d212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2100 r8:8027f5e8 r7:eb749e60 r6:853d2180 r5:85420c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85337340 INFO: task kworker/1:826:5148 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c0ea9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:827:5149 blocked for more than 467 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:85421800 r4:85421800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85421800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337980 r5:00001000 r4:eb323000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853d2200 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r5:00001000 r4:eb30b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:853d2300 r8:8027f5e8 r7:eb751e60 r6:853d2380 r5:85422400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85337740 INFO: task kworker/1:828:5150 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c139c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5154 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb759d84 r8:00000002 r7:60000013 r6:eb759d8c r5:85423000 r4:85423000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85423000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r5:00001000 r4:eb425000 r5:8545638c r4:85456000 r4:00000001 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5157 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:85424800 r4:85424800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85424800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85337c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb403000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455f8c r4:85455c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85455f8c r4:853d2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85424800 r8:853d262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb731fb0 to 0xeb731ff8) Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb459000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85426000 r8:853d272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d2700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2700 r8:8027f5e8 r7:eb761e60 r6:853d2780 r5:85426000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85337c80 INFO: task kworker/1:832:5160 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c1fd4000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:85426c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:eb5e1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853d2800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5162 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb771d84 r8:00000002 r7:60000113 r6:eb771d8c r5:85498000 r4:85498000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85498000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85498000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85456f8c r4:85456c00 r10:61c88647 r9:85498000 r8:853d292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ead87000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5169 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb765d84 r8:00000002 r7:60000013 r6:eb765d8c r5:85499800 r4:85499800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85499800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85499800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:00001000 r4:eb621000 r5:85457b8c r4:85457800 Exception stack(0xeb765fb0 to 0xeb765ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:e055ddc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:836:5170 blocked for more than 468 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r5:00001000 r4:eb5fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8549a400 r8:853d2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:853d2b80 r8:8027f5e8 r7:eb765e60 r6:853d2c00 r5:8549a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516b400 INFO: task kworker/1:836:5170 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c2b5a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5171 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8549b000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb651000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85457f8c r4:853d2c80 Exception stack(0xeb779fb0 to 0xeb779ff8) r4:8516b400 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:838 state:D stack:0 pid:5175 tgid:5175 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516bbc0 r5:00001000 r4:eb799000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546078c r4:85460400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb785fb0 to 0xeb785ff8) r4:8516b780 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5176 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:8549c800 r4:8549c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ba00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546038c r4:85460000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546038c r4:853d2e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549c800 r8:853d2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d2e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2e80 r8:8027f5e8 r7:eb785e60 r6:853d2f00 r5:8549c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516b800 INFO: task kworker/1:839:5176 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c33dc000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:840:5178 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb79dd84 r8:00000002 r7:60000113 r6:eb79dd8c r5:8549d400 r4:8549d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516bd40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85460b8c r4:85460800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85460b8c r4:853d2f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549d400 r8:853d2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853d2f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853d2f80 r8:8027f5e8 r7:eb785e60 r6:8493f000 r5:8549d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516ba40 INFO: task kworker/1:840:5178 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c36ce000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r9:83018205 r8:8549e000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 r5:00001000 r4:dfa77000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85461f8c r4:85461c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85461f8c r4:8493f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549e000 r8:8493f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493f080 r8:8027f5e8 r7:eb79de60 r6:8493f100 r5:8549e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516bc80 INFO: task kworker/1:841:5179 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c3a7e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:5183 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7a9d84 r8:00000002 r7:60000113 r6:eb7a9d8c r5:8549ec00 r4:8549ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516bf40 r5:00001000 r4:eb7b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:843 state:D stack:0 pid:5184 tgid:5184 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb7c1000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:5186 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:854a8c00 r4:854a8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ce100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546178c r4:85461400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546178c r4:8493f380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a8c00 r8:8493f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493f380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493f380 r8:8027f5e8 r7:eb7b5e60 r6:8493f400 r5:854a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ce240 INFO: task kworker/1:844:5186 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:845:5188 blocked for more than 468 seconds. r4:854a9800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7d9000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8493f480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:5191 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7ddd84 r8:00000002 r7:60000113 r6:eb7ddd8c r5:854aa400 r4:854aa400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854aa400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ce640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe71000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546238c r4:85462000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546238c r4:8493f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854aa400 r8:8493f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493f580 r8:8027f5e8 r7:eb7b5e60 r6:8493f600 r5:854aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ce3c0 INFO: task kworker/1:846:5191 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c4ff2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:5193 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:854ab000 r4:854ab000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ab000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea96f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85462b8c r4:8493f680 Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) r4:853ce440 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:848 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e05f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ce440 INFO: task kworker/1:848:5194 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c584f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:5195 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:849 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:854ac800 r4:854ac800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ac800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cec80 r5:00001000 r4:eac7b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85462f8c r4:8493f880 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5199 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:854aec00 r4:854aec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854aec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf25000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8546378c r4:85463400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546378c r4:8493f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854aec00 r8:8493f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493f980 r8:8027f5e8 r7:eb7f1e60 r6:8493fa00 r5:854aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853cea80 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:851 state:D stack:0 pid:5200 tgid:5200 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r5:00001000 r4:eaef1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8546338c r4:85463000 r10:61c88647 r9:8546b000 r8:8493faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd60: 80230ad4 80239bb0 80000013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:8546e000 r4:8546e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8546e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546e000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e2f8c r4:845e2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e2f8c r4:84bdcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8546e000 r8:84bdcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcc00 r8:8027f5e8 r7:eb70de60 r6:84bdcc80 r5:8546e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85329380 INFO: task kworker/0:186:5203 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6015000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8546ec00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b280 r5:00001000 r4:eaf61000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8493fb00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:853 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8546d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8546d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf99000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85463f8c r4:85463c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85463f8c r4:8493fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8546d400 r8:8493fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493fb80 r8:8027f5e8 r7:eb7fde60 r6:84bdcd80 r5:8546d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531b1c0 INFO: task kworker/1:853:5207 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c66ad000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8546a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:eb0af000 r7:ddde2d80 r6:83018200 r5:8550078c r4:8493fc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8531b300 Workqueue: events bpf_prog_free_deferred dd20: c66ad000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:00001000 r4:ee509000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:187:5211 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:85469800 r4:85469800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85469800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85469800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e338c r4:845e3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e338c r4:84bdce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85469800 r8:84bdceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdce80 r8:8027f5e8 r7:eb7f5e60 r6:84bdcf00 r5:85469800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb819fb0 to 0xeb819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853300c0 INFO: task kworker/0:187:5211 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c682a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5212 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5212 tgid:5212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb81dd84 r8:00000002 r7:60000113 r6:eb81dd8c r5:85468c00 r4:85468c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85468c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb81de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85468c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550038c r4:85500000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550038c r4:8493fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85468c00 r8:8493fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493fc80 r8:8027f5e8 r7:eb815e60 r6:84bdcf80 r5:85468c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb81dfb0 to 0xeb81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531b300 INFO: task kworker/1:855:5212 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6c53000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:856 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r9:83018205 r8:8546bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:00001000 r4:eb121000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85500f8c r4:85500c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85500f8c r4:8493fd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8546bc00 r8:8493fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493fd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493fd00 r8:8027f5e8 r7:eb815e60 r6:854d4000 r5:8546bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531b340 INFO: task kworker/1:856:5214 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6c53000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5216 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:8546c800 r4:8546c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb0fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85500b8c r4:8493fd80 Exception stack(0xeb82dfb0 to 0xeb82dff8) r4:8531b5c0 Workqueue: events bpf_prog_free_deferred dd20: c6f7b000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eb831d84 r8:00000002 r7:60000013 r6:eb831d8c r5:849c6c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb32f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8531b740 INFO: task kworker/1:858:5219 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c6f7b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5220 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5220 tgid:5220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:849d8000 r4:849d8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531bb00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550138c r4:85501000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550138c r4:8493fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d8000 r8:8493feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493fe80 r8:8027f5e8 r7:eb831e60 r6:854d4180 r5:849d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: c7381000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849d8c00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945a40 r5:00001000 r4:dfa8f000 r5:8550278c r4:85502400 r10:61c88647 r9:849d8c00 r8:8493ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493ff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493ff00 r8:8027f5e8 r7:eb831e60 r6:854d4200 r5:849d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb839fb0 to 0xeb839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531bac0 INFO: task kworker/1:860:5222 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c7685000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5225 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849d9800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb36b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85501b8c r4:8493ff80 Exception stack(0xeb829fb0 to 0xeb829ff8) r4:8531bc80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849da400 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531bf00 r5:00001000 r4:eb543000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85501f8c r4:85319000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: c7c77000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:5228 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb841d84 r8:00000002 r7:60000113 r6:eb841d8c r5:849db000 r4:849db000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849db000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb841e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849db000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a838c r4:853a8000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a838c r4:854d4380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849db000 r8:854d43ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d4380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d4380 r8:8027f5e8 r7:eb7f5e60 r6:854d4400 r5:849db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d0700 INFO: task kworker/0:188:5228 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: c80aa000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:863 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb9e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:5235 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:849dec00 r4:849dec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849dec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a878c r4:853a8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a878c r4:854d4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849dec00 r8:854d452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d4500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d4500 r8:8027f5e8 r7:eb841e60 r6:854d4580 r5:849dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d0d40 INFO: task kworker/0:189:5235 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8309000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:5238 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7e1d84 r8:00000002 r7:60000013 r6:eb7e1d8c r5:849de000 r4:849de000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849de000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf2f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849de000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab55000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a8b8c r4:853a8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a8b8c r4:854d4600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849de000 r8:854d462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d4600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d4600 r8:8027f5e8 r7:eb849e60 r6:854d4680 r5:849de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf2d40 INFO: task kworker/0:190:5238 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8309000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:864:5239 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:864 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:849dd400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb1d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85502f8c r4:85319100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84945a80 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb02b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85502b8c r4:85502800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85502b8c r4:85319180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849dbc00 r8:853191ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85319180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85319180 r8:8027f5e8 r7:eb805e60 r6:854d4780 r5:849dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945a80 INFO: task kworker/1:865:5241 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8a2d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:5242 blocked for more than 468 seconds. [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r4:00000000 r5:00001000 r4:eb21f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853a978c r4:854d4800 Exception stack(0xeb851fb0 to 0xeb851ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:5244 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb801d84 r8:00000002 r7:60000013 r6:eb801d8c r5:84390c00 r4:84390c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84390c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84390c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a8f8c r4:853a8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a8f8c r4:854d4900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84390c00 r8:854d492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d4900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d4900 r8:8027f5e8 r7:eb851e60 r6:854d4980 r5:84390c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5000 INFO: task kworker/0:192:5244 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c8e13000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb1f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c9322000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:866:5248 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:866 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb855d84 r8:00000002 r7:60000113 r6:eb855d8c r5:84393000 r4:84393000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84393000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84393000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550338c r4:85503000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550338c r4:85319200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84393000 r8:8531922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85319200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85319200 r8:8027f5e8 r7:eb805e60 r6:854d4b00 r5:84393000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85467080 INFO: task kworker/1:866:5248 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c9322000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb24b000 r7:dddced80 r6:83018000 r5:853a9b8c r4:854d4b80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c93b0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/0:195:5253 blocked for more than 469 seconds. r10:82918930 r9:eb869d84 r8:00000002 r7:60000013 r6:eb869d8c r5:84396000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb291000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r5:00001000 r4:eb273000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853a9f8c r4:854d4d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:84391800 r4:84391800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84391800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d52c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84391800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aa78c r4:853aa400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aa78c r4:854d4e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84391800 r8:854d4eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854d4e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d4e80 r8:8027f5e8 r7:eb869e60 r6:854d4f00 r5:84391800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d5ac0 INFO: task kworker/0:197:5257 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: c9e45000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb3b5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r5:00001000 r4:eb399000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550378c r4:85503400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550378c r4:85319280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478c00 r8:853192ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85319280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85319280 r8:8027f5e8 r7:eb855e60 r6:854da080 r5:85478c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854672c0 INFO: task kworker/1:867:5261 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ca18c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:5262 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:85479800 r4:85479800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85479800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85479800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb307000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aab8c r4:853aa800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aab8c r4:854da100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85479800 r8:854da12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da100 r8:8027f5e8 r7:eb879e60 r6:854da180 r5:85479800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854651c0 INFO: task kworker/0:199:5262 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ca18c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ef4c0 r5:00001000 r4:dff29000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85319300 Exception stack(0xeb889fb0 to 0xeb889ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85467400 INFO: task kworker/1:868:5265 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ca18c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:869:5267 blocked for more than 469 seconds. Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00 r5:00001000 r4:eb6b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb88dfb0 to 0xeb88dff8) r4:85467400 Workqueue: events bpf_prog_free_deferred dd20: ca18c000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:5268 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:8547b000 r4:8547b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547b000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb423000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ab38c r4:853ab000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ab38c r4:854da300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547b000 r8:854da32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da300 r8:8027f5e8 r7:eb879e60 r6:854da380 r5:8547b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85465380 INFO: task kworker/0:200:5268 is blocked on a mutex likely owned by task kworker/1:205:3669. Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84a51100 task:kworker/0:201 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abb8c r4:853ab800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853abb8c r4:854da400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b3c00 r8:854da42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da400 r8:8027f5e8 r7:eb891e60 r6:85319400 r5:854b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854657c0 INFO: task kworker/0:201:5270 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cab45000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:202:5271 blocked for more than 469 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb488000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ab78c r4:853ab400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ab78c r4:854da480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b4800 r8:854da4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da480 r8:8027f5e8 r7:eb865e60 r6:85319480 r5:854b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854657c0 INFO: task kworker/0:202:5271 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cab45000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:5274 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:eb89dd84 r8:00000002 r7:60000013 r6:eb89dd8c r5:854b5400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:854b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r5:00001000 r4:eb4ed000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854da500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da500 r8:8027f5e8 r7:eb865e60 r6:85319500 r5:854b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854659c0 INFO: task kworker/0:203:5274 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cadaa000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854652c0 r5:00001000 r4:eb64f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: cadaa000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:5277 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:8547c800 r4:8547c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465e00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853dc38c r4:853dc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853dc38c r4:854da600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547c800 r8:854da62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da600 r8:8027f5e8 r7:eb8a5e60 r6:854da680 r5:8547c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85465a40 INFO: task kworker/0:205:5277 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cb10a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:5280 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8a1d84 r8:00000002 r7:60000013 r6:eb8a1d8c r5:8547e000 r4:8547e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547e000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb609000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853dc78c r4:853dc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853dc78c r4:854da700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547e000 r8:854da72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da700 r8:8027f5e8 r7:eb8a5e60 r6:854da780 r5:8547e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a1fb0 to 0xeb8a1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:5281 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8add84 r8:00000002 r7:60000013 r6:eb8add8c r5:8547ec00 r4:8547ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8547ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:eb6c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853dcf8c r4:853dcc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853dcf8c r4:854da800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547ec00 r8:854da82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854da800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854da800 r8:8027f5e8 r7:eb8a5e60 r6:854da880 r5:8547ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85465c80 INFO: task kworker/0:207:5281 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cb73d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb701000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:854d5f40 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb77d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd20: cb73d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:5287 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:84828c00 r4:84828c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84828c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ddb8c r4:853dd800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ddb8c r4:854daa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84828c00 r8:854daaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854daa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854daa80 r8:8027f5e8 r7:eb8b1e60 r6:854dab00 r5:84828c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:5290 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:84829800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r9:83018005 r8:84829800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:00001000 r4:eb793000 r5:853dd78c r4:853dd400 r10:61c88647 r9:84829800 r8:854dabac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 r4:854643c0 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: cbb6f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:871:5293 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:871 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:854b1800 r4:854b1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:00001000 r4:eb8f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853def8c r4:85319680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854b6c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853ddf8c r4:854dac80 Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:5297 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8d9d84 r8:00000002 r7:60000013 r6:eb8d9d8c r5:854b0c00 r4:854b0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853de38c r4:853de000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853de38c r4:854dad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b0c00 r8:854dad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854dad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dad00 r8:8027f5e8 r7:eb8d1e60 r6:85319800 r5:854b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85464a40 INFO: task kworker/0:212:5297 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:5298 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:5298 tgid:5298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8ddd84 r8:00000002 r7:60000113 r6:eb8ddd8c r5:854b6000 r4:854b6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464d80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853de78c r4:853de400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853de78c r4:854dad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b6000 r8:854dadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854dad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dad80 r8:8027f5e8 r7:eb8d9e60 r6:85319880 r5:854b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85464a40 INFO: task kworker/0:213:5298 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:853df38c r4:854dae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:854dae00 Exception stack(0xeb8edfb0 to 0xeb8edff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:80000013 r4:80239bb0 r4:e055ddc0 r4:00000000 r5:00001000 r4:ee509000 r5:8609478c r4:86094400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:215 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8c1d84 r8:00000002 r7:60000113 r6:eb8c1d8c r5:8482a400 r4:8482a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8482a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8482a400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853deb8c r4:853de800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853deb8c r4:854dae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482a400 r8:854daeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854dae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dae80 r8:8027f5e8 r7:eb8ede60 r6:854daf00 r5:8482a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85464c00 INFO: task kworker/0:215:5301 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cc766000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eb913000 r7:dddced80 r6:83018000 r5:853dfb8c r4:854daf80 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cc908000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:5306 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb905d84 r8:00000002 r7:60000113 r6:eb905d8c r5:8482bc00 r4:8482bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8482bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ee040 r5:00001000 r4:eb907000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853df78c r4:853df400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853df78c r4:853cf080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482bc00 r8:853cf0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cf080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf080 r8:8027f5e8 r7:eb8e1e60 r6:853cf100 r5:8482bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ee080 INFO: task kworker/0:217:5306 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ccba2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:5308 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:8482c800 r4:8482c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8482c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb963000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85319980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85319980 r8:8027f5e8 r7:eb889e60 r6:853cf180 r5:8482c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ef0c0 INFO: task kworker/1:872:5308 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) r5:80000013 r4:80239bb0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eb921d84 r8:00000002 r7:60000113 r6:eb921d8c r5:854ae000 r9:83018005 r8:854ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:00001000 r4:eb923000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:5312 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:854b0000 r4:854b0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ee780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb93f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553878c r4:85538400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553878c r4:853cf280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b0000 r8:853cf2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cf280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf280 r8:8027f5e8 r7:eb921e60 r6:85319a80 r5:854b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ee300 INFO: task kworker/0:219:5312 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:ee509000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:5315 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:5315 tgid:5315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb911d84 r8:00000002 r7:60000013 r6:eb911d8c r5:8482d400 r4:8482d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8482d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ee640 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb933000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553838c r4:85538000 r7:dddced80 r6:83018000 r5:8553838c r4:853cf300 r10:61c88647 r9:8482d400 r8:853cf32c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb94b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ee740 INFO: task kworker/0:221:5317 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cd276000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:5318 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb961d84 r8:00000002 r7:60000013 r6:eb961d8c r5:84828000 r4:84828000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84828000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eea40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb957000 r5:85538f8c r4:85538c00 r10:00000000 r9:853cf500 r8:8027f5e8 r7:eb92de60 r6:853cf580 r5:84828000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:5320 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb955d84 r8:00000002 r7:60000013 r6:eb955d8c r5:84394800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r5:00001000 r4:eb97f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553978c r4:85539400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553978c r4:853cf600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84394800 r8:853cf62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cf600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf600 r8:8027f5e8 r7:eb961e60 r6:853cf680 r5:84394800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb955fb0 to 0xeb955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853eea00 INFO: task kworker/0:223:5320 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cd58f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:5323 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:5323 tgid:5323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb979d84 r8:00000002 r7:60000113 r6:eb979d8c r5:85568000 r4:85568000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eee40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85568000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553938c r4:85539000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553938c r4:853cf700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568000 r8:853cf72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cf700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf700 r8:8027f5e8 r7:eb955e60 r6:853cf780 r5:85568000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853eebc0 Workqueue: events bpf_prog_free_deferred dd20: cd58f000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:873 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 r7:ddde2d80 r6:83018200 r5:85508b8c r4:85319b00 r10:00000000 r9:85319b00 r8:8027f5e8 r7:eb889e60 r6:853cf800 r5:85569800 r4:853ef300 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: cdbb8000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:82ac11e4 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:5326 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:5326 tgid:5326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb991d84 r8:00000002 r7:60000013 r6:eb991d8c r5:85491800 r4:85491800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85491800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85491800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb987000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85539b8c r4:85539800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85539b8c r4:853cf880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85491800 r8:853cf8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cf880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf880 r8:8027f5e8 r7:eb955e60 r6:85319b80 r5:85491800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85464ec0 INFO: task kworker/0:225:5326 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cdd99000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:5328 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb999d84 r8:00000002 r7:60000113 r6:eb999d8c r5:85493000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85539f8c r4:85539c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85539f8c r4:853cf900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493000 r8:853cf92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cf900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cf900 r8:8027f5e8 r7:eb991e60 r6:85319c00 r5:85493000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85464ec0 INFO: task kworker/0:226:5328 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cdd99000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:5330 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:5330 tgid:5330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:85492400 r4:85492400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85492400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85492400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553a78c r4:8553a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553a78c r4:853cf980 r10:61c88647 r9:85492400 r8:853cf9ac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cdff0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:5331 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9b5d84 r8:00000002 r7:60000113 r6:eb9b5d8c r5:85493c00 r4:85493c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85493c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553a38c r4:8553a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553a38c r4:853cfa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:853cfa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cfa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfa00 r8:8027f5e8 r7:eb9b1e60 r6:85319d00 r5:85493c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b11c0 INFO: task kworker/0:228:5331 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cdff0000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:5333 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9bdd84 r8:00000002 r7:60000013 r6:eb9bdd8c r5:85490000 r4:85490000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85490000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85490000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553ab8c r4:8553a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553ab8c r4:853cfa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490000 r8:853cfaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cfa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfa80 r8:8027f5e8 r7:eb9b1e60 r6:85319d80 r5:85490000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1100 INFO: task kworker/0:229:5333 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ce28e000 e03b3000 00000001 80239b98 7f7b1000 00000001 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:5336 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9e1d84 r8:00000002 r7:60000013 r6:eb9e1d8c r5:85496c00 r4:85496c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85496c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553b38c r4:8553b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553b38c r4:853cfb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496c00 r8:853cfb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cfb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfb00 r8:8027f5e8 r7:eb9bde60 r6:85319e00 r5:85496c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1480 INFO: task kworker/0:230:5336 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ce28e000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:231 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9b9d84 r8:00000002 r7:60000013 r6:eb9b9d8c r5:8556b000 r4:8556b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b16c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8556b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553af8c r4:8553ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853cfb80 r8:8027f5e8 r7:eb9e1e60 r6:853cfc00 r5:8556b000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 r5:00001000 r4:ee509000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:874 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r5:00001000 r4:eac85000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8556bc00 r8:85319eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:875:5343 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:875 state:D stack:0 pid:5343 tgid:5343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:8556d400 r4:8556d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1c00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea94b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553b78c r4:8553b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8553b78c r4:85319f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556d400 r8:85319f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85319f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85319f00 r8:8027f5e8 r7:eb80de60 r6:853cfd00 r5:8556d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ef440 INFO: task kworker/1:875:5343 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cedbd000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 INFO: task kworker/1:876:5347 blocked for more than 469 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eadd3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:877:5349 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:877 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9f9d84 r8:00000002 r7:60000113 r6:eb9f9d8c r5:8556e000 r4:8556e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf35000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85509f8c r4:85509c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85509f8c r4:853b0080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556e000 r8:853b00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0080 r8:8027f5e8 r7:eb9f1e60 r6:853cfe00 r5:8556e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853280c0 INFO: task kworker/1:877:5349 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf0a7000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328040 r5:00001000 r4:eaee5000 r7:ddde2d80 r6:83018200 r5:85509b8c r4:853b0000 r10:00000000 r9:853b0000 r8:8027f5e8 r7:eb9f9e60 r6:853cff00 r5:8556a400 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba01d84 r8:00000002 r7:60000013 r6:eba01d8c r5:85568c00 r4:85568c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5080 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85568c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb045000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85548f8c r4:85548c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85548f8c r4:853cfe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568c00 r8:853cfeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853cfe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853cfe80 r8:8027f5e8 r7:eb9e1e60 r6:853cff80 r5:85568c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1dc0 INFO: task kworker/0:232:5351 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf489000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba77000 r5:8553bb8c r4:8553b800 r7:dddced80 r6:83018000 r5:8553bb8c r4:85069000 Exception stack(0xeba05fb0 to 0xeba05ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1dc0 INFO: task kworker/0:233:5352 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: cf9be000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Not tainted 6.15.0-syzkaller #0 r4:847c0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r5:00001000 r4:eafbb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847c0c00 r8:853b012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: cf9be000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:847c0000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf73000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853b0180 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: cff3b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:881:5358 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:881 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:847c1800 r4:847c1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb137000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550b38c r4:8550b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550b38c r4:853b0200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c1800 r8:853b022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0200 r8:8027f5e8 r7:eba0de60 r6:85069200 r5:847c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:882:5360 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:882 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb91dd84 r8:00000002 r7:60000013 r6:eb91dd8c r5:85496000 r4:85496000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb0bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853b0280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: d0976000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5362 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba1dd84 r8:00000002 r7:60000113 r6:eba1dd8c r5:85494800 r4:85494800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85494800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eb117000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85494800 r8:853b03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: d0f19000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r5:00001000 r4:ee509000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85490c00 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb381000 r5:8550bf8c r4:8550bc00 r10:61c88647 r9:85490c00 r8:853b04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1021000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:885:5367 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:885 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba31d84 r8:00000002 r7:60000113 r6:eba31d8c r5:85495400 r4:85495400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85495400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550b78c r4:8550b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550b78c r4:853b0580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85495400 r8:853b05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:82918930 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:854b2400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb35d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8550bb8c r4:853b0680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:887:5371 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:887 state:D stack:0 pid:5371 tgid:5371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:854ad400 r4:854ad400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ad400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853eeb80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb567000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550238c r4:85502000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550238c r4:853b0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ad400 r8:853b07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0780 r8:8027f5e8 r7:eba2de60 r6:853b0800 r5:854ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85328cc0 INFO: task kworker/1:887:5371 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r9:83018205 r8:854b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb80f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551078c r4:85510400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551078c r4:853b0880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8000 r8:853b08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0880 r8:8027f5e8 r7:eba39e60 r6:853b0900 r5:854b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba3dfb0 to 0xeba3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1dc0 INFO: task kworker/1:888:5374 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1979000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:889 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb68d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551038c r4:853b0980 Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1dc0 INFO: task kworker/1:889:5375 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1979000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:890:5377 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:890 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:854b9800 r4:854b9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d2040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85510b8c r4:85510800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85510b8c r4:853b0a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b9800 r8:853b0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0a80 r8:8027f5e8 r7:eba3de60 r6:853b0b00 r5:854b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba41fb0 to 0xeba41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2080 INFO: task kworker/1:890:5377 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1979000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a53d80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d2c40 r5:00001000 r4:eba9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85511f8c r4:85511c00 r7:ddde2d80 r6:83018200 r5:85511f8c r4:853b0b80 r10:61c88647 r9:854ba400 r8:853b0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0b80 r8:8027f5e8 r7:eba41e60 r6:853b0c00 r5:854ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2240 INFO: task kworker/1:891:5379 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d1d43000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:892:5380 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:892 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:854bbc00 r4:854bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d2300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba57000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85510f8c r4:85510c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85510f8c r4:853b0c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bbc00 r8:853b0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853b0c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b0c80 r8:8027f5e8 r7:eba49e60 r6:853b0d00 r5:854bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2340 INFO: task kworker/1:892:5380 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d20af000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eba6b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:854bc800 r8:853b0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e055ddc0 r5:8609478c r4:86094400 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eba83000 r5:8551178c r4:85511400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5388 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:854bec00 r9:83018205 r8:854bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 r5:85511b8c r4:85511800 Exception stack(0xeba99fb0 to 0xeba99ff8) r4:854d28c0 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d2480000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:854c0000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r4:00000001 task:kworker/1:897 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebaa7000 r7:ddde2d80 r6:83018200 r5:8551238c r4:854df200 r4:854df200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854df200 r8:8027f5e8 r7:ebaa5e60 r6:854df280 r5:854c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2e40 INFO: task kworker/1:897:5391 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068d80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553bf8c r4:8553bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8553bf8c r4:85069280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c1800 r8:850692ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069280 r8:8027f5e8 r7:eba01e60 r6:854df300 r5:854c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd20: d2e04000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854c3000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebad3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854df180 Exception stack(0xebac1fb0 to 0xebac1ff8) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d2e04000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5397 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5397 tgid:5397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:854c2400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec327000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80000013 r4:80239bb0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a51100 r10:82918930 r9:ebae1d84 r8:00000002 r7:60000113 r6:ebae1d8c r5:854c4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85512f8c r4:85512c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85512f8c r4:854df500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c4800 r8:854df52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854df500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebae1fb0 to 0xebae1ff8) Call trace: dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:00001000 r4:ee509000 r4:84a53d80 r4:00000001 INFO: task kworker/0:235:5401 blocked for more than 470 seconds. Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebaf5d84 r8:00000002 r7:60000013 r6:ebaf5d8c r5:854c3c00 r4:854c3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d36ee000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:ee509000 r4:84a53d80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5403 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5403 tgid:5403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec305d84 r8:00000002 r7:60000113 r6:ec305d8c r5:854c6c00 r4:854c6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec305e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaeb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551338c r4:85513000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551338c r4:854df680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c6c00 r8:854df6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854df680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854df680 r8:8027f5e8 r7:ebadde60 r6:854df700 r5:854c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec305fb0 to 0xec305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854dd740 INFO: task kworker/1:901:5403 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d3bfd000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Call trace: r4:854bd400 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebafd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551378c r4:85513400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551378c r4:854df780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bd400 r8:854df7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854df780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854df780 r8:8027f5e8 r7:ebadde60 r6:854df800 r5:854bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec30dfb0 to 0xec30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854dd940 INFO: task kworker/1:902:5405 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d3bfd000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:903:5406 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec319d84 r8:00000002 r7:60000013 r6:ec319d8c r5:854c6000 r4:854c6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec319e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddcc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec30f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85513b8c r4:85513800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85513b8c r4:854df880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c6000 r8:854df8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854df880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854df880 r8:8027f5e8 r7:ebadde60 r6:854df900 r5:854c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec319fb0 to 0xec319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ddb40 INFO: task kworker/1:903:5406 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 Exception stack(0xe055dd28 to 0xe055dd70) dd20: d3bfd000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:904:5408 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:904 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec31dd84 r8:00000002 r7:60000013 r6:ec31dd8c r5:854c5400 r4:854c5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec31de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddfc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec31f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85513f8c r4:85513c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85513f8c r4:854df980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c5400 r8:854df9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854df980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854df980 r8:8027f5e8 r7:ebadde60 r6:854dfa00 r5:854c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec31dfb0 to 0xec31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ddb40 INFO: task kworker/1:904:5408 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 dd20: d3f01000 e03b3000 00000001 80239b98 7f7b1000 00000001 r5:80000013 r4:80239bb0 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:905:5411 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:854c8000 r4:854c8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec32f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552078c r4:85520400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552078c r4:854dfa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8000 r8:854dfaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dfa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dfa80 r8:8027f5e8 r7:ebadde60 r6:854dfb00 r5:854c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d2d80 INFO: task kworker/1:905:5411 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d45b9000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:5416 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8e9d84 r8:00000002 r7:60000013 r6:eb8e9d8c r5:847c4800 r4:847c4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea857000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554878c r4:85548400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554878c r4:85069380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c4800 r8:850693ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069380 r8:8027f5e8 r7:eba01e60 r6:85069400 r5:847c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85068900 INFO: task kworker/0:236:5416 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d49d3000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:5419 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb90dd84 r8:00000002 r7:60000013 r6:eb90dd8c r5:847c2400 r4:847c2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85548b8c r4:85548800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85548b8c r4:85069480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c2400 r8:850694ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069480 r8:8027f5e8 r7:eba01e60 r6:85069500 r5:847c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850685c0 INFO: task kworker/0:237:5419 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d49d3000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5420 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb919d84 r8:00000002 r7:60000113 r6:eb919d8c r5:847c5400 r4:847c5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854660c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85520b8c r4:85520800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85520b8c r4:854dfb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c5400 r8:854dfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dfb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dfb80 r8:8027f5e8 r7:ebad1e60 r6:85069580 r5:847c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85466000 INFO: task kworker/1:906:5420 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d4b2d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:907:5421 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:907 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb929d84 r8:00000002 r7:60000113 r6:eb929d8c r5:847c6000 r4:847c6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619d80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85521f8c r4:85521c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85521f8c r4:854dfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6000 r8:854dfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dfc00 r8:8027f5e8 r7:eb919e60 r6:85069600 r5:847c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85466000 INFO: task kworker/1:907:5421 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d4cec000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5422 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:847c6c00 r4:847c6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85520f8c r4:85520c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85520f8c r4:854dfc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6c00 r8:854dfcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dfc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dfc80 r8:8027f5e8 r7:eb929e60 r6:85069680 r5:847c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85466000 INFO: task kworker/1:908:5422 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d4cec000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:5424 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb93dd84 r8:00000002 r7:60000113 r6:eb93dd8c r5:854bb000 r4:854bb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e57c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554938c r4:85549000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554938c r4:85069700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bb000 r8:8506972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069700 r8:8027f5e8 r7:eba01e60 r6:85069780 r5:854bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e5340 INFO: task kworker/0:238:5424 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d519a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:909:5426 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:909 state:D stack:0 pid:5426 tgid:5426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb951d84 r8:00000002 r7:60000113 r6:eb951d8c r5:8556c800 r4:8556c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb951e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556538c r4:85565000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556538c r4:854dfd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556c800 r8:854dfd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dfd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dfd00 r8:8027f5e8 r7:eb929e60 r6:85069800 r5:8556c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854661c0 INFO: task kworker/1:909:5426 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d53f8000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:5428 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:5428 tgid:5428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:84748000 r4:84748000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84748000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e59c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84748000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb263000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554978c r4:85549400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554978c r4:85069880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84748000 r8:850698ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069880 r8:8027f5e8 r7:eb93de60 r6:85069900 r5:84748000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e5640 INFO: task kworker/0:239:5428 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d55a2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:5430 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:84749800 r4:84749800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84749800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84749800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85549b8c r4:85549800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85549b8c r4:85069980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84749800 r8:850699ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069980 r8:8027f5e8 r7:eb95de60 r6:85069a00 r5:84749800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e54c0 INFO: task kworker/0:240:5430 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d590d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:5432 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb96dd84 r8:00000002 r7:60000013 r6:eb96dd8c r5:84748c00 r4:84748c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84748c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84748c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85549f8c r4:85549c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85549f8c r4:85069a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84748c00 r8:85069aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069a80 r8:8027f5e8 r7:eb945e60 r6:85069b00 r5:84748c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e5700 INFO: task kworker/0:241:5432 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d590d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:5434 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:5434 tgid:5434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:8474a400 r4:8474a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8474a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e5300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8474a400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554a38c r4:8554a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554a38c r4:85069b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474a400 r8:85069bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069b80 r8:8027f5e8 r7:eb96de60 r6:85069c00 r5:8474a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r5:80000013 r4:80239bb0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r5:00001000 r4:eb321000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r5:8609478c r4:86094400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:244 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:8474d400 r4:8474d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8474d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ea180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8474d400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554ab8c r4:8554a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554ab8c r4:85069d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474d400 r8:85069dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069d80 r8:8027f5e8 r7:eb98de60 r6:85069e00 r5:8474d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e5240 INFO: task kworker/0:244:5438 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d624d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:245 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ea400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8474bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554af8c r4:8554ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554af8c r4:85069e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474bc00 r8:85069eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069e80 r8:8027f5e8 r7:eb9a1e60 r6:85069f00 r5:8474bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ea0c0 INFO: task kworker/0:245:5439 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d624d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 INFO: task kworker/0:246:5442 blocked for more than 470 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r5:00001000 r4:eb5fb000 r5:8554bb8c r4:8554b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554bb8c r4:85069f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474b000 r8:85069fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069f80 r8:8027f5e8 r7:eb9a5e60 r6:854ed000 r5:8474b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ea380 INFO: task kworker/0:246:5442 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d675b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:8474ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 r5:00001000 r4:eb49d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554b38c r4:8554b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554b38c r4:854ed080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8474ec00 r8:854ed0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed080 r8:8027f5e8 r7:eb969e60 r6:854ed100 r5:8474ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 INFO: task kworker/0:248:5446 blocked for more than 470 seconds. r4:8474e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:5448 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9add84 r8:00000002 r7:60000013 r6:eb9add8c r5:847c3000 r4:847c3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ea980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb635000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554bf8c r4:8554bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554bf8c r4:854ed280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3000 r8:854ed2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed280 r8:8027f5e8 r7:eb969e60 r6:854ed300 r5:847c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ea600 INFO: task kworker/0:249:5448 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d675b000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:8609478c r4:86094400 r4:84a53d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb6b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ea900 INFO: task kworker/0:250:5450 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d6bd8000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:5452 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:5452 tgid:5452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9d9d84 r8:00000002 r7:60000113 r6:eb9d9d8c r5:84710000 r4:84710000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84710000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb78b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854ed480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:5454 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:84710c00 r4:84710c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84710c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eacc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84710c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555478c r4:85554400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555478c r4:854ed580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84710c00 r8:854ed5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed580 r8:8027f5e8 r7:eb9d9e60 r6:854ed600 r5:84710c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854eab40 INFO: task kworker/0:252:5454 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d70e1000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:5455 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:854c9800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb75d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85554b8c r4:85554800 r10:61c88647 r9:854c9800 r8:854ed6ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/0:254:5458 blocked for more than 471 seconds. r4:854cb000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec349e08 r5:00001000 r4:eb8fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec349fb0 to 0xec349ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d7341000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:5460 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec351d84 r8:00000002 r7:60000113 r6:ec351d8c r5:854cc800 r4:854cc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec351e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531a040 r4:00000000 r9:83018005 r8:854cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:00001000 r4:eb7a3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:84a51100 Workqueue: events bpf_prog_free_deferred r5:854ca400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb7bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555578c r4:854ed800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:5463 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec35dd84 r8:00000002 r7:60000113 r6:ec35dd8c r5:854cbc00 r4:854cbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec35de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531a440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85555b8c r4:85555800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85555b8c r4:854ed880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cbc00 r8:854ed8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed880 r8:8027f5e8 r7:ec349e60 r6:854dff80 r5:854cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec35dfb0 to 0xec35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531a180 INFO: task kworker/0:257:5463 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:854cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:00001000 r4:eb87f000 r7:dddced80 r6:83018000 r5:85555f8c r4:854ed900 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:5468 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:259 state:D stack:0 pid:5468 tgid:5468 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb8a7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555638c r4:85556000 r10:61c88647 r9:854ce000 r8:854ed9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8531a400 Workqueue: events bpf_prog_free_deferred dd20: d7eee000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:5470 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec385d84 r8:00000002 r7:60000113 r6:ec385d8c r5:855a0c00 r4:855a0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec385e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531a840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555678c r4:85556400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555678c r4:854eda00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a0c00 r8:854eda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eda00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eda00 r8:8027f5e8 r7:ec349e60 r6:8507f100 r5:855a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec385fb0 to 0xec385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531a540 INFO: task kworker/0:260:5470 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d86ec000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:855a1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec389e08 r5:00001000 r4:eb8f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85556b8c r4:854eda80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a1800 r8:854edaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eda80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eda80 r8:8027f5e8 r7:ec349e60 r6:8507f180 r5:855a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec389fb0 to 0xec389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531a640 INFO: task kworker/0:261:5471 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d86ec000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:5474 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:855a2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec38de08 r5:00001000 r4:eb935000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8555738c r4:854edb00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:5476 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec395d84 r8:00000002 r7:60000013 r6:ec395d8c r5:855a3c00 r4:855a3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec395e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ae80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb981000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85557b8c r4:85557800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85557b8c r4:854edb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3c00 r8:854edbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854edb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854edb80 r8:8027f5e8 r7:ec38de60 r6:8507f280 r5:855a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec395fb0 to 0xec395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531aa80 INFO: task kworker/0:263:5476 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb94d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555778c r4:854edc00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/0:265:5480 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3a5d84 r8:00000002 r7:60000013 r6:ec3a5d8c r5:855a6c00 r4:855a6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3a5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bec040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558b8c r4:85558800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85558b8c r4:854edc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a6c00 r8:854edcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854edc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854edc80 r8:8027f5e8 r7:ec395e60 r6:8507f380 r5:855a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3a5fb0 to 0xec3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531a640 INFO: task kworker/0:265:5480 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: d9068000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:5481 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:5481 tgid:5481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3a9d84 r8:00000002 r7:60000113 r6:ec3a9d8c r5:855a5400 r4:855a5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3a9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531a8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb993000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85557f8c r4:85557c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85557f8c r4:854edd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a5400 r8:854edd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854edd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854edd00 r8:8027f5e8 r7:ec3a5e60 r6:8507f400 r5:855a5400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: d9a83000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:82ac11e4 r4:00000000 r5:8609478c r4:86094400 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/0:267:5483 blocked for more than 471 seconds. r4:855a6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3b1e08 r5:00001000 r4:eb9c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8531ac00 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:268 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec339d84 r8:00000002 r7:60000013 r6:ec339d8c r5:84711800 r4:84711800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84711800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec339e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84711800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555878c r4:85558400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555878c r4:854ede00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84711800 r8:854ede2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ede00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ede00 r8:8027f5e8 r7:ec3a5e60 r6:854ede80 r5:84711800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec339fb0 to 0xec339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85068dc0 INFO: task kworker/0:268:5486 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: da6be000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:5488 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec3d3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555938c r4:854edf00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: dac55000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec341d84 r8:00000002 r7:60000113 r6:ec341d8c r5:84713c00 r4:84713c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84713c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec341e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bec2c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558f8c r4:85558c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85558f8c r4:85335080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84713c00 r8:853350ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335080 r8:8027f5e8 r7:ec3b5e60 r6:85335100 r5:84713c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec341fb0 to 0xec341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec240 INFO: task kworker/0:270:5489 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: db25c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:5492 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3c5d84 r8:00000002 r7:60000013 r6:ec3c5d8c r5:84714800 r4:84714800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84714800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:00001000 r4:ec3df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec3eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85559b8c r4:85335280 r4:85335280 Exception stack(0xec3f5fb0 to 0xec3f5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: dc29d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:5497 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec409d84 r8:00000002 r7:60000013 r6:ec409d8c r5:854c8c00 r4:854c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec409e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84becdc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec44b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555af8c r4:8555ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555af8c r4:85335300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8c00 r8:8533532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335300 r8:8027f5e8 r7:ec3f5e60 r6:8507f580 r5:854c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec409fb0 to 0xec409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec580 INFO: task kworker/0:273:5497 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dc644000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:00001000 r4:ec3fb000 r7:dddced80 r6:83018000 r5:85559f8c r4:85335380 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: dc8ae000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec41dd84 r8:00000002 r7:60000113 r6:ec41dd8c r5:855a9800 r4:855a9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec41de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beca40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec40b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a38c r4:8555a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555a38c r4:85335400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:8533542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335400 r8:8027f5e8 r7:ec409e60 r6:8507f680 r5:855a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec41dfb0 to 0xec41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec680 INFO: task kworker/0:275:5500 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dcb21000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec423000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555a78c r4:8555a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555a78c r4:85335480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aa400 r8:853354ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335480 r8:8027f5e8 r7:ec409e60 r6:8507f700 r5:855aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec421fb0 to 0xec421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec8c0 INFO: task kworker/0:276:5501 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dcd9d000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:277 state:D stack:0 pid:5503 tgid:5503 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec42f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555ab8c r4:85335500 Exception stack(0xec441fb0 to 0xec441ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dcf5f000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124280 r5:00001000 r4:ec48f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8555bf8c r4:85335580 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: dd246000 e03b3000 00000001 80239b98 7f7b1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ec45b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b38c r4:8555b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555b38c r4:85335600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:8533562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335600 r8:8027f5e8 r7:ec459e60 r6:8507f880 r5:855abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec471fb0 to 0xec471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84becd80 INFO: task kworker/0:279:5508 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dd3ef000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec47dd84 r8:00000002 r7:60000113 r6:ec47dd8c r5:855ac800 r4:855ac800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ac800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec47de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84becf40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec473000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b78c r4:8555b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8555b78c r4:85335680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ac800 r8:853356ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335680 r8:8027f5e8 r7:ec459e60 r6:8507f900 r5:855ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec47dfb0 to 0xec47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ea0c0 INFO: task kworker/0:280:5509 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dd459000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec485e08 r5:00001000 r4:ec487000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:5514 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:5514 tgid:5514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4b1d84 r8:00000002 r7:60000113 r6:ec4b1d8c r5:855ae000 r4:855ae000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ae000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851249c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4dd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556138c r4:85561000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556138c r4:85335780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ae000 r8:853357ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85124100 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:283:5515 blocked for more than 472 seconds. r4:855ad400 r4:00000000 r4:00000000 r5:00001000 r4:ec4ad000 r5:8556038c r4:85560000 r4:85335800 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:5518 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:5518 tgid:5518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4c9d84 r8:00000002 r7:60000013 r6:ec4c9d8c r5:855a3000 r4:855a3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851245c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556078c r4:85560400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556078c r4:85335880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3000 r8:853358ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:8609478c r4:86094400 r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124700 r5:00001000 r4:ec4c5000 r7:dddced80 r6:83018000 r5:85560b8c r4:85335900 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:5521 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4e1d84 r8:00000002 r7:60000013 r6:ec4e1d8c r5:855b0000 r4:855b0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124880 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85560f8c r4:85560c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85560f8c r4:85335980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0000 r8:853359ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335980 r8:8027f5e8 r7:ec4b1e60 r6:8507fc00 r5:855b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4e1fb0 to 0xec4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85124580 INFO: task kworker/0:286:5521 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: de36a000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8609478c r4:86094400 r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:5523 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba11d84 r8:00000002 r7:60000013 r6:eba11d8c r5:855b0c00 r4:855b0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556178c r4:85561400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556178c r4:85335a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:85335a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335a00 r8:8027f5e8 r7:ec4b1e60 r6:8507fc80 r5:855b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851243c0 INFO: task kworker/0:287:5523 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: de638000 e03b3000 00000001 80239b98 7f7b1000 00000001 r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:855b1800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff77000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85561b8c r4:85561800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85561b8c r4:85335a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:85335aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335a80 r8:8027f5e8 r7:eba11e60 r6:8507fd00 r5:855b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851243c0 INFO: task kworker/0:288:5526 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: de638000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:855b2400 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:eade3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556278c r4:85562400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556278c r4:85335b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:85335b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335b00 r8:8027f5e8 r7:eba51e60 r6:8507fd80 r5:855b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba5dfb0 to 0xeba5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85124900 INFO: task kworker/0:289:5528 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: de962000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea8f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85335b80 r8:8027f5e8 r7:eba5de60 r6:8507fe00 r5:855b3000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:8609478c r4:86094400 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a51100 task:kworker/0:291 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851666c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb135000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85563b8c r4:85563800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85563b8c r4:85335c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:85335c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335c00 r8:8027f5e8 r7:eba5de60 r6:8507fe80 r5:855b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3ddfb0 to 0xec3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85124e80 INFO: task kworker/0:291:5532 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ded1c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:5535 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba7dd84 r8:00000002 r7:60000013 r6:eba7dd8c r5:855b4800 r4:855b4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166040 r5:00001000 r4:eaf0f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:855b5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85562f8c r4:85562c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85562f8c r4:85335d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:85335d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335d00 r8:8027f5e8 r7:ec3dde60 r6:8507ff80 r5:855b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85166100 INFO: task kworker/0:293:5536 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: df0d2000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:5539 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebacdd84 r8:00000002 r7:60000013 r6:ebacdd8c r5:855b8000 r4:855b8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eb08f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556338c r4:85563000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556338c r4:85335d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8000 r8:85335dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335d80 r8:8027f5e8 r7:ec3dde60 r6:845ba000 r5:855b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85166280 INFO: task kworker/0:294:5539 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: df51c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f7000 r7:dddced80 r6:83018000 r5:8556378c r4:85335e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166800 r5:00001000 r4:eb343000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85563f8c r4:85563c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85563f8c r4:85335e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bb000 r8:85335eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335e80 r8:8027f5e8 r7:ec3dde60 r6:845ba100 r5:855bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec32dfb0 to 0xec32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85166440 INFO: task kworker/0:296:5543 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: df51c000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:5545 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:5545 tgid:5545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3d1d84 r8:00000002 r7:60000013 r6:ec3d1d8c r5:84715400 r4:84715400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84715400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84715400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb471000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556478c r4:85564400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556478c r4:85335f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84715400 r8:85335f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85335f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335f00 r8:8027f5e8 r7:ec32de60 r6:85335f80 r5:84715400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3d1fb0 to 0xec3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85166680 INFO: task kworker/0:297:5545 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r4:00000000 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84716c00 r4:8291892c r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556438c r4:85564000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556438c r4:854edf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84716c00 r8:854edfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854edf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854edf80 r8:8027f5e8 r7:ec3d1e60 r6:848e5000 r5:84716c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85166680 INFO: task kworker/0:298:5546 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dfe19000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84716000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb695000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85564b8c r4:85564800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85564b8c r4:848e5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84716000 r8:848e50ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5080 r8:8027f5e8 r7:ec3d1e60 r6:848e5100 r5:84716000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4edfb0 to 0xec4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851669c0 INFO: task kworker/0:299:5549 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dfe19000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84712400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f5e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8556578c r4:85565400 r4:848e5180 5fa0: 00000000 00000000 00000000 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85588000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec335e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85166dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85588000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85564f8c r4:85564c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85564f8c r4:848e5300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588000 r8:848e532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5300 r8:8027f5e8 r7:ec4f5e60 r6:848e5380 r5:85588000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec335fb0 to 0xec335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85166f00 INFO: task kworker/0:301:5553 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: dfe19000 e03b3000 00000001 80239b98 7f7b1000 00000001 dd40: 82ac05a0 7f7b1000 e03b3000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86079cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f7b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8609478c r4:86094400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8609478c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:302:5556 blocked for more than 472 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:eba4d000 r5:85565b8c r4:85565800 r10:61c88647 r9:85589800 r8:848e542c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5557 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:910 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec509d84 r8:00000002 r7:60000113 r6:ec509d8c r5:8558a400 r4:8558a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9fec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba85000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552138c r4:85521000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552138c r4:845ba180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558a400 r8:845ba1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845ba180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845ba180 r8:8027f5e8 r7:eb929e60 r6:848e5500 r5:8558a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84a9fa00 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:e055ddc0 r5:00001000 r4:ee509000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:5559 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:5559 tgid:5559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec50dd84 r8:00000002 r7:60000013 r6:ec50dd8c r5:8558b000 r4:8558b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec50de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556638c r4:85566000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556638c r4:848e5580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558b000 r8:848e55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5580 r8:8027f5e8 r7:ec505e60 r6:848e5600 r5:8558b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec50dfb0 to 0xec50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85075580 INFO: task kworker/0:303:5559 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a42200 task:kworker/0:304 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85588c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85588c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec515e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e13c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85588c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaaf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85565f8c r4:85565c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85565f8c r4:848e5680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588c00 r8:848e56ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5680 r8:8027f5e8 r7:ec50de60 r6:848e5700 r5:85588c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec515fb0 to 0xec515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e1300 INFO: task kworker/0:304:5561 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:911:5563 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:911 state:D stack:0 pid:5563 tgid:5563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:8558d400 r4:8558d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9fc80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552178c r4:85521400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552178c r4:845ba200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558d400 r8:845ba22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845ba200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845ba200 r8:8027f5e8 r7:eb929e60 r6:848e5780 r5:8558d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec519fb0 to 0xec519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a9fd40 INFO: task kworker/1:911:5563 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:5565 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:5565 tgid:5565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec521d84 r8:00000002 r7:60000013 r6:ec521d8c r5:8558c800 r4:8558c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1a00 r5:00001000 r4:ebafb000 r5:8556678c r4:85566400 r4:848e5800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5567 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:912 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec529d84 r8:00000002 r7:60000113 r6:ec529d8c r5:8558bc00 r4:8558bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec529e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6b00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85651b8c r4:85651800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85651b8c r4:845ba280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558bc00 r8:845ba2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845ba280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845ba280 r8:8027f5e8 r7:eb929e60 r6:848e5900 r5:8558bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec529fb0 to 0xec529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a9fe80 INFO: task kworker/1:912:5567 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec501d84 r8:00000002 r7:60000113 r6:ec501d8c r5:855b9800 r4:00000000 r4:00000000 r5:00001000 r4:ec323000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85566b8c r4:85566800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85566b8c r4:848e5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b9800 r8:848e59ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5980 r8:8027f5e8 r7:ec521e60 r6:845ba300 r5:855b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec501fb0 to 0xec501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e1700 INFO: task kworker/0:306:5569 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad4 80239bb0 90090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r5:00001000 r4:ec4e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:90090013 r4:80239bb0 r5:00001000 r4:e03bf000 r4:84a4a480 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec55de08 r5:00001000 r4:ec52d000 r7:dddced80 r6:83018000 r5:8556738c r4:848e5a80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e1a40 INFO: task kworker/0:308:5573 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:5575 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 r4:855bec00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f65c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec575fb0 to 0xec575ff8) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 Exception stack(0xe0529fb0 to 0xe0529ff8) Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec54d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556778c r4:85567400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556778c r4:848e5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bc800 r8:848e5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5b80 r8:8027f5e8 r7:ec575e60 r6:845ba500 r5:855bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec581fb0 to 0xec581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e1e00 INFO: task kworker/0:310:5576 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e15c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec565000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85567b8c r4:85567800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85567b8c r4:848e5c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855be000 r8:848e5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5c00 r8:8027f5e8 r7:ec575e60 r6:845ba580 r5:855be000 INFO: task kworker/0:311:5578 is blocked on a mutex likely owned by task kworker/0:76:3655. [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:312:5580 blocked for more than 472 seconds. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85567f8c r4:85567c00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:313:5582 is blocked on a mutex likely owned by task kworker/0:76:3655. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:00000001 Not tainted 6.15.0-syzkaller #0 task:kworker/0:314 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5bdd84 r8:00000002 r7:60000113 r6:ec5bdd8c r5:845e8c00 r4:845e8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845e8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565078c r4:85650400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:845e8c00 r8:848e5dac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:845e8000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec5cd000 r10:61c88647 r9:845e8000 r8:848e5e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:845e9800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85651f8c r4:85651c00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5ddfb0 to 0xec5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f64c0 INFO: task kworker/0:316:5589 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 Exception stack(0xe0529fb0 to 0xe0529ff8) r10:82918930 r9:ec5e1d84 r8:00000002 r7:60000113 r6:ec5e1d8c r5:845eb000 r5:00001000 r4:ec5d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:845eb000 r8:848e5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5f00 r8:8027f5e8 r7:ec5dde60 r6:845ba880 r5:845eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e1fb0 to 0xec5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f64c0 INFO: task kworker/0:317:5590 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 r5:90090013 r4:80239bb0 r5:00001000 r4:e03bf000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dfabf000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854f6800 r4:00000000 r4:82ac11e4 r5:00001000 r4:e03bf000 r4:00000001 r4:84a42200 r10:82918930 r9:ec525d84 r8:00000002 r7:60000113 r6:ec525d8c r5:845ec800 r5:00001000 r4:eb415000 r5:8565338c r4:85653000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845ec800 r8:848e52ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e5280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e5280 r8:8027f5e8 r7:ec5dde60 r6:845ba980 r5:845ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec525fb0 to 0xec525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f6a40 INFO: task kworker/0:319:5595 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7fa42000 ee50b000 00000001 80239b98 7f7b5000 00000001 r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eb1d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec369e08 r5:00001000 r4:eb213000 r10:61c88647 r9:845ee000 r8:8561d02c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000001 INFO: task kworker/0:321:5602 blocked for more than 472 seconds. Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:845eec00 r4:845eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb267000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85652b8c r4:85652800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8561d080 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:5604 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec375d84 r8:00000002 r7:60000113 r6:ec375d8c r5:845ea400 r4:845ea400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845ea400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec375e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0040 r5:00001000 r4:eb2a7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:845ea400 r8:8561d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d100 r8:8027f5e8 r7:ec525e60 r6:845bac00 r5:845ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec375fb0 to 0xec375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0000 INFO: task kworker/0:322:5604 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:84b0938c r4:84b09000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5607 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec36dd84 r8:00000002 r7:60000113 r6:ec36dd8c r5:855bbc00 r4:855bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec36de08 r4:00000000 r5:00001000 r4:eb39b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8552238c r4:845bac80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) INFO: task kworker/1:915:5609 blocked for more than 472 seconds. r4:855c0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec391e08 r4:00000000 r5:00001000 r4:eb8ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85522b8c r4:845bad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0000 r8:845badac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:845bad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845bad80 r8:8027f5e8 r7:ec36de60 r6:845bae00 r5:855c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec391fb0 to 0xec391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85619d40 INFO: task kworker/1:915:5609 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/1:916:5610 blocked for more than 472 seconds. r4:855c0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3b9e08 r5:00001000 r4:eb8cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8552278c r4:845bae80 Exception stack(0xec3b9fb0 to 0xec3b9ff8) INFO: task kworker/1:916:5610 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855c1800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb497000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565378c r4:85653400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565378c r4:8561d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c1800 r8:8561d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d180 r8:8027f5e8 r7:ec525e60 r6:845baf80 r5:855c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3c1fb0 to 0xec3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e01c0 INFO: task kworker/0:323:5611 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 Workqueue: events bpf_prog_free_deferred r5:855c3c00 r4:8291892c [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3e5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9ff80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85655b8c r4:85655800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85655b8c r4:8561d200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3c00 r8:8561d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d200 r8:8027f5e8 r7:ec3c1e60 r6:85615000 r5:855c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3e5fb0 to 0xec3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0400 INFO: task kworker/0:324:5614 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b0938c r4:84b09000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:855c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3e9e08 r5:00001000 r4:eb5a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85653b8c r4:85653800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653b8c r4:8561d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c2400 r8:8561d2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d280 r8:8027f5e8 r7:ec3e5e60 r6:85615080 r5:855c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3e9fb0 to 0xec3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0640 INFO: task kworker/0:325:5615 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec3f9d84 r8:00000002 r7:60000113 r6:ec3f9d8c r5:855c5400 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85653f8c r4:85653c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653f8c r4:8561d300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c5400 r8:8561d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d300 r8:8027f5e8 r7:ec3e5e60 r6:85615100 r5:855c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3f9fb0 to 0xec3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0480 INFO: task kworker/0:326:5617 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:00000001 r4:84a42200 Not tainted 6.15.0-syzkaller #0 r4:855c6000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a5000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xec415fb0 to 0xec415ff8) INFO: task kworker/0:327:5619 is blocked on a mutex likely owned by task kworker/0:76:3655. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:5621 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c3000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec429e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:329 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec455e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0c00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb787000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85654b8c r4:85654800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85654b8c r4:8561d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6c00 r8:8561d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d480 r8:8027f5e8 r7:ec3e5e60 r6:85615280 r5:855c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec455fb0 to 0xec455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0c00 INFO: task kworker/0:329:5623 is blocked on a mutex likely owned by task kworker/0:76:3655. Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:5625 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:5625 tgid:5625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec479d84 r8:00000002 r7:60000113 r6:ec479d8c r5:855c8c00 r4:855c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec479e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0d80 r5:00001000 r4:eb79f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec479fb0 to 0xec479ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0a40 INFO: task kworker/0:330:5625 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/0:331:5627 blocked for more than 472 seconds. r4:855c8000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb7bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565538c r4:85655000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565538c r4:8561d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c8000 r8:8561d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d580 r8:8027f5e8 r7:ec3e5e60 r6:85615380 r5:855c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0bc0 INFO: task kworker/0:331:5627 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:5629 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb7e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8565578c r4:85655400 r4:8561d600 Exception stack(0xec5f5fb0 to 0xec5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0d40 INFO: task kworker/0:332:5629 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:333:5631 blocked for more than 472 seconds. r4:855c9800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb985000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855c9800 r8:8561d6ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853e0f80 INFO: task kworker/0:333:5631 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:855cbc00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85617ec0 r5:00001000 r4:eb909000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85522f8c r4:85615500 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85617a80 INFO: task kworker/1:917:5634 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5636 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:855cc800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec39de08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb939000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855cc800 r8:8561562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615600 r8:8027f5e8 r7:ec5f1e60 r6:85615680 r5:855cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec39dfb0 to 0xec39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85617a80 INFO: task kworker/1:918:5636 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:e0529dc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855cd400 r8:8561572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:90090013 r4:80239bb0 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:5639 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:920 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5fdd84 r8:00000002 r7:60000113 r6:ec5fdd8c r5:855ce000 r4:855ce000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ce000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ead35000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85523f8c r4:85523c00 r10:61c88647 r9:855ce000 r8:8561582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r5:90090013 r4:80239bb0 r4:e0529dc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:5642 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec609d84 r8:00000002 r7:60000113 r6:ec609d8c r5:855ca400 r4:855ca400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ca400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb959000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85655f8c r4:85655c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85655f8c r4:8561d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ca400 r8:8561d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d700 r8:8027f5e8 r7:ec5f9e60 r6:85615900 r5:855ca400 r4:00000001 Exception stack(0xec609fb0 to 0xec609ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:90090013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:5644 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec60dd84 r8:00000002 r7:60000013 r6:ec60dd8c r5:855c4800 r4:855c4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec60de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:855c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:00001000 r4:eb099000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c4800 r8:8561d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d780 r8:8027f5e8 r7:ec5f9e60 r6:85615980 r5:855c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec60dfb0 to 0xec60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f6780 INFO: task kworker/0:335:5644 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:5645 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:855d0000 r4:855d0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8565678c r4:8561d800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r4:e0529dc0 r5:00001000 r4:e03bf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:5649 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:855d0c00 r4:855d0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85656b8c r4:85656800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85656b8c r4:8561d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d0c00 r8:8561d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d880 r8:8027f5e8 r7:ec60de60 r6:85615a80 r5:855d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:e03bf000 r4:84a4a480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:855d1800 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec531000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc38c r4:855fc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fc38c r4:85615b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d1800 r8:85615b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615b00 r8:8027f5e8 r7:ec5fde60 r6:85615b80 r5:855d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:921:5651 is blocked on a mutex likely owned by task kworker/0:76:3655. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:922 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb68b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8561c100 INFO: task kworker/1:922:5652 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:338:5655 blocked for more than 473 seconds. r4:855d3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 r5:00001000 r4:eaf83000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85623480 INFO: task kworker/0:338:5655 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:5657 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec611d84 r8:00000002 r7:60000013 r6:ec611d8c r5:855d5400 r4:855d5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85657f8c r4:85657c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85657f8c r4:8561d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8561d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561d980 r8:8027f5e8 r7:ec60de60 r6:85615d80 r5:855d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856235c0 INFO: task kworker/0:339:5657 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec591e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856238c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb129000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565778c r4:85657400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565778c r4:8561da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:8561da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561da00 r8:8027f5e8 r7:ec611e60 r6:8561da80 r5:848ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856235c0 INFO: task kworker/0:340:5658 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84b0938c r4:84b09000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Not tainted 6.15.0-syzkaller #0 r5:848bb000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb347000 r5:85657b8c r4:85657800 r10:61c88647 r9:848bb000 r8:8561db2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:341:5660 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:342:5661 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:5661 tgid:5661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec619d84 r8:00000002 r7:60000113 r6:ec619d8c r5:848bc800 r4:848bc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848bc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec619e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85658b8c r4:85658800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85658b8c r4:8561dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bc800 r8:8561dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561dc00 r8:8027f5e8 r7:ec611e60 r6:8561dc80 r5:848bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec619fb0 to 0xec619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856236c0 INFO: task kworker/0:342:5661 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec621d84 r8:00000002 r7:60000113 r6:ec621d8c r5:848be000 r4:00000000 r9:83018205 r8:848be000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8561c800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:924:5666 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:924 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:848bec00 r4:848bec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848bec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec629e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561cc00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f5f8c r4:841f5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f5f8c r4:85615e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bec00 r8:85615eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85615e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85615e80 r8:8027f5e8 r7:ebad9e60 r6:8561dd80 r5:848bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec629fb0 to 0xec629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8561c940 INFO: task kworker/1:924:5666 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:848b8000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717ec0 r5:00001000 r4:ec4d7000 r10:61c88647 r9:848b8000 r8:85615f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:925:5669 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:5670 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:848bd400 r4:848bd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848bd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618040 r5:00001000 r4:eba07000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8561de80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848b9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r5:00001000 r4:eba29000 r5:8565878c r4:85658400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565878c r4:8561df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b9800 r8:8561dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561df80 r8:8027f5e8 r7:ec619e60 r6:8561b000 r5:848b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85618240 INFO: task kworker/0:344:5672 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 task:kworker/0:345 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebabd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848b8c00 r8:8561b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618180 r4:00000000 9d60: 80230ad4 80239bb0 90090013 ffffffff [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec639d84 r8:00000002 r7:60000013 r6:ec639d8c r5:848bbc00 r4:848bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec301000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565978c r4:85659400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565978c r4:8561b180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bbc00 r8:8561b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b180 r8:8027f5e8 r7:ec5a9e60 r6:8561b200 r5:848bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85618380 INFO: task kworker/0:346:5677 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r5:84b0938c r4:84b09000 r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r5:00001000 r4:ebae5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855cec00 r8:8561b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618500 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Not tainted 6.15.0-syzkaller #0 r4:8558ec00 r4:00000000 r9:83018005 r8:8558ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:df8ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85659f8c r4:85659c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85659f8c r4:8561b380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558ec00 r8:8561b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b380 r8:8027f5e8 r7:ec639e60 r6:8561b400 r5:8558ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856186c0 INFO: task kworker/0:348:5681 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e0529dc0 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 task:kworker/0:349 state:D stack:0 pid:5682 tgid:5682 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec321000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8561b480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:847d0000 r4:847d0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8561b580 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) r4:e0529dc0 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:351 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eabab000 r10:61c88647 r9:847d0c00 r8:8561b6ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0529d28 to 0xe0529d70) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:5689 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:847d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:00001000 r4:eb035000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565ab8c r4:8565a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565ab8c r4:8561b780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d1800 r8:8561b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b780 r8:8027f5e8 r7:ec3f1e60 r6:8561b800 r5:847d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec401fb0 to 0xec401ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:5691 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec451d84 r8:00000002 r7:60000113 r6:ec451d8c r5:847d2400 r4:847d2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec451e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8561b880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85618e40 INFO: task kworker/0:353:5691 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:5693 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:354 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb207000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8565af8c r4:8561b980 r10:61c88647 r9:847d3000 r8:8561b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b980 r8:8027f5e8 r7:ec451e60 r6:8561ba00 r5:847d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec461fb0 to 0xec461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638000 INFO: task kworker/0:354:5693 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:5695 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:847d3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a5e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565b78c r4:8565b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565b78c r4:8561ba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d3c00 r8:8561baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561ba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ba80 r8:8027f5e8 r7:ec451e60 r6:8561bb00 r5:847d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a5fb0 to 0xec4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638180 INFO: task kworker/0:355:5695 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 7ff55000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 90090013 ffffffff r5:90090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r5:00001000 r4:eb4e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:847d5400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb31f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565bb8c r4:8565b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565bb8c r4:8561bc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d5400 r8:8561bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561bc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561bc80 r8:8027f5e8 r7:ec649e60 r6:8561bd00 r5:847d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638440 INFO: task kworker/0:357:5699 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:5701 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb439000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:5703 blocked for more than 473 seconds. task:kworker/0:359 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855d3c00 r8:8561be2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb607000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec66dd84 r8:00000002 r7:60000113 r6:ec66dd8c r5:856b8c00 r4:856b8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85664b8c r4:85664800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85664b8c r4:8561bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b8c00 r8:8561bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561bf00 r8:8027f5e8 r7:ec661e60 r6:856f3100 r5:856b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638800 INFO: task kworker/0:361:5706 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:856b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:00001000 r4:eb75b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:5710 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec67dd84 r8:00000002 r7:60000113 r6:ec67dd8c r5:856b9800 r4:856b9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638d00 r5:00001000 r4:eb797000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8566538c r4:856f1000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec685d84 r8:00000002 r7:60000013 r6:ec685d8c r5:856bbc00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb7c9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:84a4a480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:5714 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:5714 tgid:5714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec68dd84 r8:00000002 r7:60000113 r6:ec68dd8c r5:856bb000 r4:856bb000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bb000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85638f80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb881000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85665b8c r4:85665800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85665b8c r4:856f1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bb000 r8:856f112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1100 r8:8027f5e8 r7:ec661e60 r6:856f3300 r5:856bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85638cc0 INFO: task kworker/0:365:5714 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/0:366:5716 blocked for more than 473 seconds. r4:856bc800 r4:00000000 r4:00000000 r5:00001000 r4:eb35b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856bc800 r8:856f11ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:5718 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec69dd84 r8:00000002 r7:60000113 r6:ec69dd8c r5:856bec00 r4:856bec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec69de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623fc0 r5:00001000 r4:eb8f5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8566638c r4:85666000 r10:61c88647 r9:856bec00 r8:856f122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85638f40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a42200 task:kworker/0:368 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:df83f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec5b1fb0 to 0xec5b1ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) INFO: task kworker/0:369:5722 blocked for more than 473 seconds. r5:856ba400 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e067f000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85666b8c r4:856f1300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ba400 r8:856f132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1300 r8:8027f5e8 r7:ec695e60 r6:856f3500 r5:856ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fe080 INFO: task kworker/0:369:5722 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 task:kworker/0:370 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ead07000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:5726 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:5726 tgid:5726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6b1d84 r8:00000002 r7:60000113 r6:ec6b1d8c r5:856c0c00 r4:856c0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b1e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaf23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8566738c r4:856f1400 Exception stack(0xec6b1fb0 to 0xec6b1ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r9:83018005 r8:856c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:856f1480 r8:8027f5e8 r7:ec695e60 r6:856f3680 r5:856c2400 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) INFO: task kworker/0:373:5731 blocked for more than 474 seconds. r4:856c3c00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85667b8c r4:85667800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85667b8c r4:856f1500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c3c00 r8:856f152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1500 r8:8027f5e8 r7:ec695e60 r6:856f3700 r5:856c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c5fb0 to 0xec6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fe580 INFO: task kworker/0:373:5731 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:5733 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6cdd84 r8:00000002 r7:60000013 r6:ec6cdd8c r5:856c3000 r4:856c3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856feac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb569000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8566838c r4:85668000 r4:856f1580 Exception stack(0xec6cdfb0 to 0xec6cdff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84b0938c r4:84b09000 r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 r4:856c4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d5e08 r9:83018005 r8:856c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:00001000 r4:eb947000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec6d5fb0 to 0xec6d5ff8) INFO: task kworker/0:375:5735 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:5736 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:5736 tgid:5736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:856c5400 r4:856c5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856feb80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb811000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566878c r4:85668400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566878c r4:856f1680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c5400 r8:856f16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1680 r8:8027f5e8 r7:ec6d5e60 r6:856f3880 r5:856c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d9fb0 to 0xec6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fea40 INFO: task kworker/0:376:5736 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r4:00000000 r5:84b0938c r4:84b09000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/0:377:5738 blocked for more than 474 seconds. r4:856c0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e1e08 r5:00001000 r4:eba9d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:378 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fed40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85668f8c r4:85668c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85668f8c r4:856f1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d6000 r8:856f17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1780 r8:8027f5e8 r7:ec6e1e60 r6:856f1800 r5:847d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6ddfb0 to 0xec6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856feb40 INFO: task kworker/0:378:5740 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:5744 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba27000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 80299000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:5749 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6e9d84 r8:00000002 r7:60000113 r6:ec6e9d8c r5:84962400 r4:84962400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84962400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec325000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8566a38c r4:856f1a80 Exception stack(0xec6e9fb0 to 0xec6e9ff8) INFO: task kworker/0:381:5749 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:382 state:D stack:0 pid:5750 tgid:5750 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d9e08 r5:00001000 r4:ebaf9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85669f8c r4:856f1b80 Exception stack(0xec3d9fb0 to 0xec3d9ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84963c00 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857135c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84963c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec345000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566a78c r4:8566a400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566a78c r4:856f1c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:856f1cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1c80 r8:8027f5e8 r7:ec6e9e60 r6:856f1d00 r5:84963c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85713300 INFO: task kworker/0:383:5753 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 82bd1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:5755 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:5755 tgid:5755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84964800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec3a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566af8c r4:8566ac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566af8c r4:856f1d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84964800 r8:856f1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1d80 r8:8027f5e8 r7:ec6ede60 r6:856f1e00 r5:84964800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85713400 INFO: task kworker/0:384:5755 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8308c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:385:5756 blocked for more than 474 seconds. r4:84965400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f9e08 r5:00001000 r4:ec359000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8566ab8c r4:856f1e80 r10:00000000 r9:856f1e80 r8:8027f5e8 r7:ec6f5e60 r6:856f1f00 r5:84965400 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a4a480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:386:5759 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6fdd84 r8:00000002 r7:60000013 r6:ec6fdd8c r5:84966000 r4:84966000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84966000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6fde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85713a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566b38c r4:8566b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566b38c r4:856f1f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966000 r8:856f1fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f1f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f1f80 r8:8027f5e8 r7:ec6f5e60 r6:85721000 r5:84966000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857137c0 INFO: task kworker/0:386:5759 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 83496000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:387 state:D stack:0 pid:5761 tgid:5761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec701d84 r8:00000002 r7:60000113 r6:ec701d8c r5:84966c00 r4:84966c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84966c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r5:00001000 r4:ec3fd000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec701fb0 to 0xec701ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) r4:84a42200 task:kworker/0:388 state:D stack:0 pid:5763 tgid:5763 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r9:83018005 r8:84960c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:00001000 r4:ec417000 r7:dddced80 r6:83018000 r5:8566bb8c r4:85721180 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:388:5763 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 83832000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:5765 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:5765 tgid:5765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:847d6c00 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec42d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8566bf8c r4:85721280 Exception stack(0xec709fb0 to 0xec709ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:5767 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec70dd84 r8:00000002 r7:60000013 r6:ec70dd8c r5:85690000 r4:85690000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r5:00001000 r4:ec447000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85721380 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec711d84 r8:00000002 r7:60000113 r6:ec711d8c r5:85690c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec46b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 83f30000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:5770 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:5770 tgid:5770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6f1d84 r8:00000002 r7:60000013 r6:ec6f1d8c r5:85691800 r4:85691800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85691800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ec481000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a42200 r4:85692400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:8567138c r4:85671000 r4:85721680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85721680 r8:8027f5e8 r7:ec6f1e60 r6:85721700 r5:85692400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec715fb0 to 0xec715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572c000 INFO: task kworker/0:393:5772 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 84130000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:00000001 task:kworker/0:394 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec4a7000 r7:dddced80 r6:83018000 r5:85670f8c r4:85721780 r4:8572c4c0 Exception stack(0xe0529d28 to 0xe0529d70) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:5777 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec719d84 r8:00000002 r7:60000113 r6:ec719d8c r5:85694800 r4:85694800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85694800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec719e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c880 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:395:5777 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec729e08 r9:83018005 r8:85696000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85721b00 r8:8027f5e8 r7:ec725e60 r6:85721b80 r5:85696000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec729fb0 to 0xec729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572cac0 INFO: task kworker/0:397:5782 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 85435000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:5784 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec72dd84 r8:00000002 r7:60000013 r6:ec72dd8c r5:85693000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec553000 r5:8567278c r4:85672400 r4:85721c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb405000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856c6c00 r8:856f39ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:926:5785 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 85b05000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:5786 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:5786 tgid:5786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec735d84 r8:00000002 r7:60000113 r6:ec735d8c r5:856c1800 r4:856c1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec735e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec563000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85672b8c r4:85672800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85672b8c r4:85721d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:399:5786 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/1:927:5788 blocked for more than 474 seconds. r4:856c6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec739e08 r5:00001000 r4:ec597000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8567338c r4:856f3b00 Exception stack(0xec739fb0 to 0xec739ff8) INFO: task kworker/1:927:5788 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 r4:84a4a480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ec741d84 r8:00000002 r7:60000013 r6:ec741d8c r5:856bd400 r4:856bd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec741e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85730040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec585000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85672f8c r4:85672c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85672f8c r4:85721d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bd400 r8:85721dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85721d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85721d80 r8:8027f5e8 r7:ec735e60 r6:856f3c00 r5:856bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec741fb0 to 0xec741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572cf40 INFO: task kworker/0:400:5791 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 867fa000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Not tainted 6.15.0-syzkaller #0 r4:84838000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec745e08 r5:00001000 r4:eae49000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85673b8c r4:85721e00 r4:00000001 Exception stack(0xec745fb0 to 0xec745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85730100 INFO: task kworker/0:401:5793 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 867fa000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:85698c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec5b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8567378c r4:85721e80 Exception stack(0xec73dfb0 to 0xec73dff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0599000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855fcb8c r4:856f3d00 Exception stack(0xec74dfb0 to 0xec74dff8) INFO: task kworker/1:928:5798 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:84b0938c r4:84b09000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a42200 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec679e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573ae80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84839800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fd78c r4:855fd400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fd78c r4:856f3d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84839800 r8:856f3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f3d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f3d80 r8:8027f5e8 r7:ec721e60 r6:856f3e00 r5:84839800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec679fb0 to 0xec679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8573a200 INFO: task kworker/1:929:5800 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8739b000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5804 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8483a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r5:00001000 r4:eb1fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85673f8c r4:85721a80 Exception stack(0xec75dfb0 to 0xec75dff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a42200 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec761d84 r8:00000002 r7:60000113 r6:ec761d8c r5:8483bc00 r4:8483bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8483bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85730ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb289000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567c38c r4:8567c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567c38c r4:8573b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483bc00 r8:8573b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573b000 r8:8027f5e8 r7:ec75de60 r6:856f3f00 r5:8483bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec761fb0 to 0xec761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85730940 INFO: task kworker/0:404:5806 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8739b000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb2fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855fcf8c r4:8573b080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/0:406:5808 blocked for more than 474 seconds. r4:8483c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec769e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8573b100 r8:8027f5e8 r7:ec765e60 r6:8573f000 r5:8483c800 r4:85730940 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:407:5809 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:5809 tgid:5809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec76dd84 r8:00000002 r7:60000113 r6:ec76dd8c r5:8483d400 r4:8483d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8483d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567cb8c r4:8567c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567cb8c r4:8573b180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483d400 r8:8573b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573b180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573b180 r8:8027f5e8 r7:ec769e60 r6:8573f080 r5:8483d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85730940 INFO: task kworker/0:407:5809 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8785b000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:930 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec759e08 r4:00000000 r5:00001000 r4:eb6ff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855fdf8c r4:8573f100 Exception stack(0xec759fb0 to 0xec759ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 87c95000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:931:5813 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:931 state:D stack:0 pid:5813 tgid:5813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec731d84 r8:00000002 r7:60000113 r6:ec731d8c r5:8483ec00 r4:8483ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8483ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573ad80 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb693000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8573f200 Exception stack(0xec731fb0 to 0xec731ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r4:00000000 r5:84b0938c r4:84b09000 r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) INFO: task kworker/1:932:5816 blocked for more than 475 seconds. r10:82918930 r9:ec749d84 r8:00000002 r7:60000013 r6:ec749d8c r5:84838c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 r5:00001000 r4:eb7ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855fe38c r4:8573f300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:5818 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec775d84 r8:00000002 r7:60000113 r6:ec775d8c r5:856c8000 r4:856c8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fef8c r4:855fec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fef8c r4:8573f400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c8000 r8:8573f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573f400 r8:8027f5e8 r7:ec749e60 r6:8573f480 r5:856c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8573a400 INFO: task kworker/1:933:5818 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 88262000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:934:5820 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:5820 tgid:5820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec771d84 r8:00000002 r7:60000013 r6:ec771d8c r5:856c9800 r4:856c9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec771e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7d7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8573f500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 task:kworker/1:935 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r9:83018205 r8:856cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:00001000 r4:eb8bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855feb8c r4:855fe800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855feb8c r4:8573f600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cb000 r8:8573f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573f600 r8:8027f5e8 r7:ec775e60 r6:8573f680 r5:856cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec77dfb0 to 0xec77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572e000 INFO: task kworker/1:935:5822 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 88831000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:936:5824 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:936 state:D stack:0 pid:5824 tgid:5824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec781d84 r8:00000002 r7:60000013 r6:ec781d8c r5:856cbc00 r4:856cbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec5cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8573f700 r8:8027f5e8 r7:ec775e60 r6:8573f780 r5:856cbc00 INFO: task kworker/1:936:5824 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:937:5826 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:937 state:D stack:0 pid:5826 tgid:5826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec779d84 r8:00000002 r7:60000113 r6:ec779d8c r5:856ca400 r4:856ca400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ca400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:00001000 r4:ec653000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855ffb8c r4:855ff800 r7:ddde2d80 r6:83018200 r5:855ffb8c r4:8573f800 Exception stack(0xec779fb0 to 0xec779ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:938:5828 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:938 state:D stack:0 pid:5828 tgid:5828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec785d84 r8:00000002 r7:60000113 r6:ec785d8c r5:856cc800 r4:856cc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572e700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:856cc800 r8:8573f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) r4:84a42200 task:kworker/1:939 state:D stack:0 pid:5830 tgid:5830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:856cd400 r4:856cd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572eb80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f578c r4:841f5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f578c r4:8573fa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cd400 r8:8573fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573fa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573fa00 r8:8027f5e8 r7:ec779e60 r6:8573fa80 r5:856cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572e900 INFO: task kworker/1:939:5830 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 891c2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:940 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec78dd84 r8:00000002 r7:60000013 r6:ec78dd8c r5:856ce000 r4:856ce000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ce000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec78de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572ea00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec667000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fff8c r4:855ffc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fff8c r4:8573fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ce000 r8:8573fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573fb00 r8:8027f5e8 r7:ec789e60 r6:8573fb80 r5:856ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec78dfb0 to 0xec78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572e840 INFO: task kworker/1:940:5832 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 891c2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:941 state:D stack:0 pid:5834 tgid:5834 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec79f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8560c78c r4:8573fc00 r4:8573fc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a4a480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:942:5836 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:942 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec795d84 r8:00000002 r7:60000013 r6:ec795d8c r5:856c8c00 r4:856c8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572ed80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560c38c r4:8560c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856c8c00 r8:8573fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec7db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560db8c r4:8560d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560db8c r4:8573fe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d0000 r8:8573fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8573fe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573fe00 r8:8027f5e8 r7:ec791e60 r6:8573fe80 r5:856d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec79dfb0 to 0xec79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572edc0 INFO: task kworker/1:943:5838 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 899b3000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:5840 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec7ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8560cb8c r4:8573ff00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560cf8c r4:8560cc00 r10:61c88647 r9:856d1800 r8:8571f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572f040 INFO: task kworker/1:945:5842 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 89d60000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:946:5844 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:946 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7c1d84 r8:00000002 r7:60000113 r6:ec7c1d8c r5:856d2400 r4:856d2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572f300 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560d38c r4:8560d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560d38c r4:8571f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d2400 r8:8571f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571f100 r8:8027f5e8 r7:ec79de60 r6:8571f180 r5:856d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c1fb0 to 0xec7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572f180 INFO: task kworker/1:946:5844 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8a081000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b0938c r4:84b09000 r4:84a4a480 r4:00000001 r4:84a42200 task:kworker/1:947 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:856d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:00001000 r4:ec7cf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec7cdfb0 to 0xec7cdff8) r4:8572f2c0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 9d60: 80230ad4 80239bb0 80090013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:948:5848 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:948 state:D stack:0 pid:5848 tgid:5848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7d9d84 r8:00000002 r7:60000113 r6:ec7d9d8c r5:856d3c00 r4:856d3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572fc00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560eb8c r4:8560e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560eb8c r4:8571f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d3c00 r8:8571f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571f300 r8:8027f5e8 r7:ec79de60 r6:8571f380 r5:856d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d9fb0 to 0xec7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572f680 INFO: task kworker/1:948:5848 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:856d4800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec7e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8560df8c r4:8571f400 Exception stack(0xec7e5fb0 to 0xec7e5ff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8a9f9000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:950:5851 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:950 state:D stack:0 pid:5851 tgid:5851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7fdd84 r8:00000002 r7:60000113 r6:ec7fdd8c r5:856d5400 r4:856d5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7fde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572f8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560e38c r4:8560e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560e38c r4:8571f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d5400 r8:8571f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571f500 r8:8027f5e8 r7:ec7d9e60 r6:8571f580 r5:856d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7fdfb0 to 0xec7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572f540 INFO: task kworker/1:950:5851 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8af6a000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a4a480 r4:00000001 Exception stack(0xe0529fb0 to 0xe0529ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:951:5854 blocked for more than 475 seconds. task:kworker/1:951 state:D stack:0 pid:5854 tgid:5854 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856d6000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572fb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec803000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560e78c r4:8560e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560e78c r4:8571f600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d6000 r8:8571f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571f600 r8:8027f5e8 r7:ec7d9e60 r6:8571f680 r5:856d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f1fb0 to 0xec7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572f640 INFO: task kworker/1:951:5854 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8af6a000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:952:5856 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:952 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec80dd84 r8:00000002 r7:60000013 r6:ec80dd8c r5:856d6c00 r4:856d6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572fdc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:00001000 r4:ec81b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ef8c r4:8560ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560ef8c r4:8571f700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:856d9800 r4:856d9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85730240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560f78c r4:8560f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560f78c r4:8571f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d9800 r8:8571f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571f900 r8:8027f5e8 r7:ec819e60 r6:8571f980 r5:856d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec801fb0 to 0xec801ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8572fe00 INFO: task kworker/1:954:5860 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0529d28 to 0xe0529d70) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 Exception stack(0xe0529fb0 to 0xe0529ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec83b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560fb8c r4:8560f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560fb8c r4:8571fa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8569d400 r8:8571fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571fa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571fa00 r8:8027f5e8 r7:ec801e60 r6:8573b200 r5:8569d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec845fb0 to 0xec845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fe040 INFO: task kworker/1:955:5862 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8ba8b000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8569ec00 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec84b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ff8c r4:8560fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560ff8c r4:8571fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8569ec00 r8:8571faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571fa80 r8:8027f5e8 r7:ec845e60 r6:8573b280 r5:8569ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570b1c0 INFO: task kworker/1:956:5864 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8c196000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb35f000 r7:ddde2d80 r6:83018200 r5:8577578c r4:8571fb00 r4:8570b100 Exception stack(0xe0529d28 to 0xe0529d70) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:df921000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570b100 INFO: task kworker/1:958:5867 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8c759000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r5:00001000 r4:e0039000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/1:960:5871 blocked for more than 475 seconds. [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eadab000 r4:8571fc80 r4:8570b440 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:84a4a480 r4:84a42200 r4:8569b000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8571fd00 r8:8027f5e8 r7:ec6b5e60 r6:8573b500 r5:8569b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570b740 INFO: task kworker/1:961:5873 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8ccce000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:eb0ff000 r7:ddde2d80 r6:83018200 r5:8577538c r4:8571fd80 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8cf96000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8570ba80 Exception stack(0xe0529d28 to 0xe0529d70) r5:00001000 r4:e03bf000 r4:00000001 task:kworker/1:965 state:D stack:0 pid:5882 tgid:5882 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb9c9000 Exception stack(0xec87dfb0 to 0xec87dff8) Exception stack(0xe0529d28 to 0xe0529d70) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eba19000 r7:ddde2d80 r6:83018200 r5:8577678c r4:8571ff80 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebaa9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776b8c r4:85776800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85776b8c r4:856ff000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476a400 r8:856ff02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ff000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ff000 r8:8027f5e8 r7:ec865e60 r6:8573b800 r5:8476a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8570be40 INFO: task kworker/1:967:5887 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8d608000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:00000001 task:kworker/1:968 state:D stack:0 pid:5889 tgid:5889 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec379000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:e0529dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:ec34b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567d38c r4:8573b880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856da400 r8:8573b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573b880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573b880 r8:8027f5e8 r7:ec769e60 r6:856ff180 r5:856da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857163c0 INFO: task kworker/0:408:5892 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8e08b000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:856dd400 r4:856dd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567e38c r4:8567e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567e38c r4:8573b900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ec3bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8567d78c r4:8567d400 r10:61c88647 r9:856dc800 r8:8573b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0529d28 to 0xe0529d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:969:5896 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:969 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec899d84 r8:00000002 r7:60000113 r6:ec899d8c r5:856dec00 r4:856dec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fdd00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec425000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:970 state:D stack:0 pid:5898 tgid:5898 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec403000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856d8c00 r8:856ff42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:5900 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:5900 tgid:5900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:856e0000 r4:856e0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857012c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec46d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567db8c r4:8567d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567db8c r4:8573ba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0000 r8:8573ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573ba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573ba00 r8:8027f5e8 r7:ec891e60 r6:856ff500 r5:856e0000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:971 state:D stack:0 pid:5903 tgid:5903 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:ec43d000 r7:ddde2d80 r6:83018200 r5:85777b8c r4:856ff580 r10:00000000 r9:856ff580 r8:8027f5e8 r7:ec899e60 r6:856ff600 r5:856e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fdb00 INFO: task kworker/1:971:5903 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8eaf1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a42200 task:kworker/1:972 state:D stack:0 pid:5905 tgid:5905 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856e3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fd240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec48b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85777f8c r4:85777c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85777f8c r4:856ff680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e3000 r8:856ff6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ff680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ff680 r8:8027f5e8 r7:ec8a9e60 r6:856ff700 r5:856e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) r4:856fdd80 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:412 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567df8c r4:8567dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567df8c r4:8573ba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e3c00 r8:8573baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573ba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573ba80 r8:8027f5e8 r7:ec891e60 r6:856ff780 r5:856e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b1fb0 to 0xec8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701140 INFO: task kworker/0:412:5908 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8eaf1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:5909 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:973 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec4b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578038c r4:85780000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578038c r4:856ff800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e4800 r8:856ff82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:856ff800 r8:8027f5e8 r7:ec8ade60 r6:856ff880 r5:856e4800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:5911 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec825d84 r8:00000002 r7:60000013 r6:ec825d8c r5:8476b000 r4:8476b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578078c r4:85780400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578078c r4:856ff900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:856ff92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ff900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ff900 r8:8027f5e8 r7:ec8b5e60 r6:8573bb00 r5:8476b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711100 INFO: task kworker/1:974:5911 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f0c2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 task:kworker/1:975 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r5:00001000 r4:ec4db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85780b8c r4:856ff980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85780f8c r4:85780c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85780f8c r4:856ffa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:856ffa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffa00 r8:8027f5e8 r7:ec885e60 r6:8573bc00 r5:8476d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711400 INFO: task kworker/1:976:5915 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f3e0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:977:5917 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:977 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:8476c800 r4:8476c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711c00 r5:00001000 r4:ec59f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85781f8c r4:85781c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85781f8c r4:856ffa80 r4:856ffa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffa80 r8:8027f5e8 r7:ec8bde60 r6:8573bc80 r5:8476c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711480 INFO: task kworker/1:977:5917 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f3e0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:5918 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:5918 tgid:5918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8c9d84 r8:00000002 r7:60000013 r6:ec8c9d8c r5:8476ec00 r4:8476ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857117c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8476ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec547000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578138c r4:85781000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578138c r4:856ffb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476ec00 r8:856ffb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffb00 r8:8027f5e8 r7:ec8c5e60 r6:8573bd00 r5:8476ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85711480 INFO: task kworker/1:978:5918 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f595000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:5920 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8d1d84 r8:00000002 r7:60000013 r6:ec8d1d8c r5:849a0c00 r4:849a0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:00001000 r4:ec55f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849a0c00 r8:856ffbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r4:e0529dc0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/1:980:5922 blocked for more than 475 seconds. r4:856e1800 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec583000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85781b8c r4:85781800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85781b8c r4:856ffc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e1800 r8:856ffc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffc00 r8:8027f5e8 r7:ec8c5e60 r6:856ffc80 r5:856e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec89dfb0 to 0xec89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711980 INFO: task kworker/1:980:5922 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f97c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:5925 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:5925 tgid:5925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:856e5400 r4:856e5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578238c r4:85782000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578238c r4:856ffd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e5400 r8:856ffd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffd00 r8:8027f5e8 r7:ec8c5e60 r6:856ffd80 r5:856e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d9fb0 to 0xec8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711a80 INFO: task kworker/1:981:5925 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f97c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:5927 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8ddd84 r8:00000002 r7:60000013 r6:ec8ddd8c r5:856e6000 r4:856e6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec697000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578278c r4:85782400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578278c r4:856ffe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6000 r8:856ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffe00 r8:8027f5e8 r7:ec8d9e60 r6:856ffe80 r5:856e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711bc0 INFO: task kworker/1:982:5927 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8fbf2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:983:5929 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:983 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:856e6c00 r4:856e6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782b8c r4:85782800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85782b8c r4:856fff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6c00 r8:856fff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856fff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856fff00 r8:8027f5e8 r7:ec8dde60 r6:856fff80 r5:856e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711cc0 INFO: task kworker/1:983:5929 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8fdb3000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 INFO: task kworker/1:984:5931 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:856e0c00 r4:856e0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f4040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782f8c r4:85782c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85782f8c r4:856f5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0c00 r8:856f502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5000 r8:8027f5e8 r7:ec8e1e60 r6:856f5080 r5:856e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711cc0 INFO: task kworker/1:984:5931 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8fdb3000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:985 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec8ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578338c r4:85783000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578338c r4:856f5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856de000 r8:856f512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5100 r8:8027f5e8 r7:ec8e5e60 r6:856f5180 r5:856de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f41c0 INFO: task kworker/1:985:5933 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:e0529dc0 r5:00001000 r4:e03bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec903000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783b8c r4:85783800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85783b8c r4:856f5200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8000 r8:856f522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5200 r8:8027f5e8 r7:ec8e9e60 r6:856f5280 r5:856e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8edfb0 to 0xec8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f41c0 INFO: task kworker/1:986:5935 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 902c5000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:84b0938c r4:84b09000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec8f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8578378c r4:85783400 r4:856f5300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a42200 INFO: task kworker/1:988:5939 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:5939 tgid:5939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:856e9800 r4:856e9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f47c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783f8c r4:85783c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85783f8c r4:856f5400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e9800 r8:856f542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5400 r8:8027f5e8 r7:ec8ede60 r6:856f5480 r5:856e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f4400 INFO: task kworker/1:988:5939 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9057f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0529fb0 to 0xe0529ff8) r5:856eb000 r4:8291892c r5:00001000 r4:ec93f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:856f5500 r8:8027f5e8 r7:ec901e60 r6:856f5580 r5:856eb000 Exception stack(0xe0529d28 to 0xe0529d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:990 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f4980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec917000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578838c r4:85788000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578838c r4:856f5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:856f562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5600 r8:8027f5e8 r7:ec90de60 r6:856f5680 r5:856ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f4640 INFO: task kworker/1:990:5942 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 90bfd000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:856f5700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec309000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578b38c r4:8578b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578b38c r4:856f5800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ebc00 r8:856f582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5800 r8:8027f5e8 r7:ec90de60 r6:856f5880 r5:856ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f4c40 INFO: task kworker/1:992:5948 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 915e8000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:993:5949 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:993 state:D stack:0 pid:5949 tgid:5949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec935d84 r8:00000002 r7:60000013 r6:ec935d8c r5:856ed400 r4:856ed400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ed400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fdd80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788f8c r4:85788c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85788f8c r4:856f5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ed400 r8:856f592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5900 r8:8027f5e8 r7:ec949e60 r6:856f5980 r5:856ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fdb40 INFO: task kworker/1:993:5949 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 915e8000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:5951 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec959d84 r8:00000002 r7:60000113 r6:ec959d8c r5:857e8000 r4:857e8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578938c r4:85789000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578938c r4:856f5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e8000 r8:856f5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5a00 r8:8027f5e8 r7:ec949e60 r6:856f5a80 r5:857e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2040 INFO: task kworker/1:994:5951 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 915e8000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5952 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5952 tgid:5952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec969d84 r8:00000002 r7:60000113 r6:ec969d8c r5:857e9800 r4:857e9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec969e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567f38c r4:8567f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567f38c r4:8573be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e9800 r8:8573be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573be00 r8:8027f5e8 r7:ec891e60 r6:856f5b00 r5:857e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec969fb0 to 0xec969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701ec0 INFO: task kworker/0:413:5952 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9201d000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:5954 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:5954 tgid:5954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec96dd84 r8:00000002 r7:60000113 r6:ec96dd8c r5:857ea400 r4:857ea400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ea400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857016c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567e78c r4:8567e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567e78c r4:8573be80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ea400 r8:8573beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573be80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573be80 r8:8027f5e8 r7:ec969e60 r6:856f5b80 r5:857ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec96dfb0 to 0xec96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701ec0 INFO: task kworker/0:414:5954 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9201d000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:5955 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec97dd84 r8:00000002 r7:60000113 r6:ec97dd8c r5:857ebc00 r4:857ebc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ebc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec97de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567ef8c r4:8567ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567ef8c r4:8573bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ebc00 r8:8573bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573bf00 r8:8027f5e8 r7:ec969e60 r6:856f5c00 r5:857ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec97dfb0 to 0xec97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85701bc0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92542000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5959 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5959 tgid:5959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec921d84 r8:00000002 r7:60000013 r6:ec921d8c r5:849a2400 r4:849a2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567f78c r4:8567f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567f78c r4:8573bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a2400 r8:8573bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573bf80 r8:8027f5e8 r7:ec969e60 r6:85643000 r5:849a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701500 INFO: task kworker/0:416:5959 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92542000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:5962 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:5962 tgid:5962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7c9d84 r8:00000002 r7:60000113 r6:ec7c9d8c r5:857e8c00 r4:857e8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84970f8c r4:84970c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84970f8c r4:85643080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e8c00 r8:856430ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643080 r8:8027f5e8 r7:ec921e60 r6:856f5c80 r5:857e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c9fb0 to 0xec7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6100 INFO: task kworker/0:417:5962 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92793000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:5963 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:5963 tgid:5963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7d5d84 r8:00000002 r7:60000013 r6:ec7d5d8c r5:857ec800 r4:857ec800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ec800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567fb8c r4:8567f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567fb8c r4:85643100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ec800 r8:8564312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643100 r8:8027f5e8 r7:ec7c9e60 r6:856f5d00 r5:857ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6100 INFO: task kworker/0:418:5963 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92cce000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:995:5966 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:995 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7a5d84 r8:00000002 r7:60000113 r6:ec7a5d8c r5:857ed400 r4:857ed400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ed400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578978c r4:85789400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578978c r4:856f5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ed400 r8:856f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5d80 r8:8027f5e8 r7:ec949e60 r6:856f5e00 r5:857ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a5fb0 to 0xec7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2a40 INFO: task kworker/1:995:5966 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92cce000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:996:5968 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:996 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:857ee000 r4:857ee000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ee000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb789000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85789b8c r4:85789800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85789b8c r4:856f5e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ee000 r8:856f5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5e80 r8:8027f5e8 r7:ec949e60 r6:856f5f00 r5:857ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2d80 INFO: task kworker/1:996:5968 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 931a1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:419 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f66c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567ff8c r4:8567fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567ff8c r4:85643180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857eb000 r8:856431ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643180 r8:8027f5e8 r7:ec7c9e60 r6:856f5f80 r5:857eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7edfb0 to 0xec7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6540 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:5972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7f9d84 r8:00000002 r7:60000113 r6:ec7f9d8c r5:856eec00 r4:856eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec81d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85789f8c r4:85789c00 r7:ddde2d80 r6:83018200 r5:85789f8c r4:856f9000 r4:856f9000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856f2f00 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0529d28 to 0xe0529d70) 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:420:5975 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb915000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84970b8c r4:84970800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84970b8c r4:85643200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0c00 r8:8564322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643200 r8:8027f5e8 r7:ec7c9e60 r6:856f9100 r5:857f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec821fb0 to 0xec821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6680 INFO: task kworker/0:420:5975 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 93d5f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:421 state:D stack:0 pid:5977 tgid:5977 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r5:00001000 r4:ec5d7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85643280 r8:8027f5e8 r7:ec821e60 r6:856f9180 r5:857f2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f68c0 INFO: task kworker/0:421:5977 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 943e9000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5979 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec981d84 r8:00000002 r7:60000113 r6:ec981d8c r5:857f3c00 r4:857f3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec831000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b9f8c r4:857b9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b9f8c r4:85643300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3c00 r8:8564332c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85643300 r8:8027f5e8 r7:ec841e60 r6:856f9200 r5:857f3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:423 state:D stack:0 pid:5981 tgid:5981 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec655000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b878c r4:857b8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b878c r4:85643380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f1800 r8:856433ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643380 r8:8027f5e8 r7:ec981e60 r6:856f9280 r5:857f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6a00 INFO: task kworker/0:423:5981 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 94792000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:5982 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:5982 tgid:5982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec98dd84 r8:00000002 r7:60000013 r6:ec98dd8c r5:857f4800 r4:857f4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec66f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b8b8c r4:857b8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b8b8c r4:85643400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f4800 r8:8564342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643400 r8:8027f5e8 r7:ec981e60 r6:856f9300 r5:857f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6a00 INFO: task kworker/0:424:5982 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 94bf0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:5984 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec995d84 r8:00000002 r7:60000013 r6:ec995d8c r5:857f3000 r4:857f3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6e80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec689000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b8f8c r4:857b8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b8f8c r4:85643480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3000 r8:856434ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643480 r8:8027f5e8 r7:ec981e60 r6:856f9380 r5:857f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6f00 INFO: task kworker/0:425:5984 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9508f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:5986 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec99dd84 r8:00000002 r7:60000013 r6:ec99dd8c r5:857f6000 r4:857f6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6f40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec797000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b938c r4:857b9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b938c r4:85643500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6000 r8:8564352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643500 r8:8027f5e8 r7:ec981e60 r6:856f9400 r5:857f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6d00 INFO: task kworker/0:426:5986 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9508f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:427 state:D stack:0 pid:5988 tgid:5988 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r9:83018005 r8:857f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:00001000 r4:ec7b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b978c r4:857b9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b978c r4:85643580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f5400 r8:856435ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643580 r8:8027f5e8 r7:ec981e60 r6:856f9480 r5:857f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6dc0 INFO: task kworker/0:427:5988 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 95515000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:5989 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:5989 tgid:5989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9a9d84 r8:00000002 r7:60000013 r6:ec9a9d8c r5:857f0000 r4:857f0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b9b8c r4:857b9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b9b8c r4:85643600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0000 r8:8564362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643600 r8:8027f5e8 r7:ec981e60 r6:856f9500 r5:857f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a9fb0 to 0xec9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2c40 INFO: task kworker/0:428:5989 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 95515000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:5992 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:998 state:D stack:0 pid:5992 tgid:5992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7e1d84 r8:00000002 r7:60000113 r6:ec7e1d8c r5:857f6c00 r4:857f6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85745b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a38c r4:8578a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578a38c r4:856f9580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6c00 r8:856f95ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f9580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9580 r8:8027f5e8 r7:ec949e60 r6:856f9600 r5:857f6c00 Exception stack(0xec7e1fb0 to 0xec7e1ff8) r4:8571b800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:856ee000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec9ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ba38c r4:857ba000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ba38c r4:85643680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ee000 r8:856436ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643680 r8:8027f5e8 r7:ec981e60 r6:856f9680 r5:856ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2780 INFO: task kworker/0:429:5994 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 95a01000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:5996 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:5996 tgid:5996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9bdd84 r8:00000002 r7:60000013 r6:ec9bdd8c r5:857eec00 r4:857eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571e0c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ba78c r4:857ba400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ba78c r4:85643700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857eec00 r8:8564372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643700 r8:8027f5e8 r7:ec9b1e60 r6:856f9700 r5:857eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2180 INFO: task kworker/0:430:5996 is blocked on a mutex likely owned by task kworker/0:76:3655. r4:00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5998 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:5998 tgid:5998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9d5d84 r8:00000002 r7:60000013 r6:ec9d5d8c r5:857f8c00 r4:857f8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571e400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857baf8c r4:857bac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857baf8c r4:85643780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8c00 r8:856437ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643780 r8:8027f5e8 r7:ec9bde60 r6:856f9780 r5:857f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d5fb0 to 0xec9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8571e1c0 INFO: task kworker/0:431:5998 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 965dc000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857fb000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r5:00001000 r4:ec9c5000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85643800 r8:8027f5e8 r7:ec9d5e60 r6:856f9800 r5:857fb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 96a16000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:857f9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec9e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857bb38c r4:85643880 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8571e200 INFO: task kworker/0:433:6002 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 96c3c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:6005 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:6005 tgid:6005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:857fa400 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca01000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85643900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6006 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:857fc800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:00001000 r4:ec9f1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeca0dfb0 to 0xeca0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:6008 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca1dd84 r8:00000002 r7:60000013 r6:eca1dd8c r5:857fd400 r4:857fd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ea80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca25000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857bc38c r4:857bc000 r7:dddced80 r6:83018000 r5:857bc38c r4:85643a00 Exception stack(0xeca1dfb0 to 0xeca1dff8) r4:8571e6c0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:857fbc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bbf8c r4:857bbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bbf8c r4:85643a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:85643aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643a80 r8:8027f5e8 r7:eca1de60 r6:856f9a80 r5:857fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8571e7c0 INFO: task kworker/0:437:6009 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 970b1000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca3dd84 r8:00000002 r7:60000013 r6:eca3dd8c r5:857f8000 r4:857f8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ebc0 r5:00001000 r4:eca35000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bc78c r4:85643b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8000 r8:85643b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643b00 r8:8027f5e8 r7:eca1de60 r6:856f9b00 r5:857f8000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r5:00001000 r4:ecac5000 r10:61c88647 r9:85800c00 r8:85643bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:61c88647 r9:85801800 r8:85643c2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 97495000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 r5:00001000 r4:e03bf000 r4:00000001 Workqueue: events bpf_prog_free_deferred [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85800000 r8:85643cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 INFO: task kworker/0:443:6021 blocked for more than 476 seconds. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:857bd78c r4:857bd400 Exception stack(0xeca89fb0 to 0xeca89ff8) Exception stack(0xe0529d28 to 0xe0529d70) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a42200 r5:85806000 r4:8291892c [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85643e00 r4:8571bac0 Exception stack(0xe0529d28 to 0xe0529d70) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:6026 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecaadd84 r8:00000002 r7:60000013 r6:ecaadd8c r5:85803c00 r4:85803c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85803c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:eca95000 r10:61c88647 r9:85803c00 r8:85643eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82918930 r9:ecab9d84 r8:00000002 r7:60000113 r6:ecab9d8c r5:85805400 r5:00001000 r4:ecaa5000 r7:dddced80 r6:83018000 r5:857be38c r4:85643f00 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:6030 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:6030 tgid:6030 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecab5000 Exception stack(0xecacdfb0 to 0xecacdff8) Exception stack(0xe0529d28 to 0xe0529d70) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857bf38c r4:857bf000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85748340 INFO: task kworker/0:448:6032 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 98ceb000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748680 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a42200 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:ecaf5000 r4:85751100 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:6038 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:6038 tgid:6038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb0dd84 r8:00000002 r7:60000113 r6:ecb0dd8c r5:8580b000 r4:8580b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748bc0 r5:00001000 r4:ecb15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9958c000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:6039 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:6039 tgid:6039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:85809800 r4:85809800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85809800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85809800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bfb8c r4:857bf800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85751200 9fa0: 00000000 00000000 00000000 00000000 r4:85748780 INFO: task kworker/0:452:6039 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 996b7000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:ecb31000 Exception stack(0xecb39fb0 to 0xecb39ff8) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:454 state:D stack:0 pid:6044 tgid:6044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:849a3000 r4:849a3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:00001000 r4:ecb25000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9d20: 99d6d000 ee50b000 00000001 80239b98 7f7b5000 00000001 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82918930 r9:ecb45d84 r8:00000002 r7:60000113 r6:ecb45d8c r5:849a6c00 r5:00001000 r4:ecb55000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85748d80 INFO: task kworker/0:456:6048 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9a027000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82918930 r9:ec955d84 r8:00000002 r7:60000013 r6:ec955d8c r5:849a3c00 r5:00001000 r4:ecb4d000 r5:857c0f8c r4:857c0c00 5fa0: 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ecb61d84 r8:00000002 r7:60000013 r6:ecb61d8c r5:849a1800 r4:849a1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb75000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c1f8c r4:857c1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:84b0938c r4:84b09000 9fa0: 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb5d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c178c r4:857c1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c178c r4:85751800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0000 r8:8575182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85751800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765780 r7:dddced80 r6:83018000 r5:857c1b8c r4:85751900 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765c40 r5:00001000 r4:ecb8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c238c r4:857c2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c238c r4:85751a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:85751a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85751a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85751a00 r8:8027f5e8 r7:ecb61e60 r6:85751a80 r5:8476e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85765700 INFO: task kworker/0:461:6058 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9af69000 ee50b000 00000001 80239b98 7f7b5000 00000001 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 r10:61c88647 r9:85041800 r8:85751b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r5:00001000 r4:ecbad000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r7:ddde2d80 r6:83018200 r5:8578a78c r4:85758300 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecbb5fb0 to 0xecbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85765f00 INFO: task kworker/0:464:6066 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9b7b1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:ecbc5000 r7:dddced80 r6:83018000 r5:857c338c r4:85751d80 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763780 r10:61c88647 r9:8580d400 r8:85751e2c r7:82804d40 r6:dddced80 r5:dddceda0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) Not tainted 6.15.0-syzkaller #0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8580bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c378c r4:857c3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c378c r4:85751e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580bc00 r8:85751eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85751e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85751e80 r8:8027f5e8 r7:ecbd9e60 r6:85758600 r5:8580bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbddfb0 to 0xecbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) Exception stack(0xe0529fb0 to 0xe0529ff8) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:ddde2d80 r6:83018200 r5:8578af8c r4:85758580 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:00000001 task:kworker/0:469 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85810c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec91dd84 r8:00000002 r7:60000013 r6:ec91dd8c r5:85811800 r4:85811800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85811800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xec91dfb0 to 0xec91dff8) r4:00000000 r4:e0529dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8575d080 r8:8027f5e8 r7:ec91de60 r6:85758880 r5:85813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85763600 INFO: task kworker/0:471:6081 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9cb37000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 Exception stack(0xe0529fb0 to 0xe0529ff8) [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c8f8c r4:857c8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c8f8c r4:8575d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810000 r8:8575d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d180 r8:8027f5e8 r7:ec961e60 r6:85758980 r5:85810000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbedfb0 to 0xecbedff8) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a42200 INFO: task kworker/0:474:6087 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:6087 tgid:6087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbf1d84 r8:00000002 r7:60000013 r6:ecbf1d8c r5:85814800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85814800 r8:8575d22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:6090 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:6090 tgid:6090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec975d84 r8:00000002 r7:60000113 r6:ec975d8c r5:85815400 r4:85815400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85815400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec975e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85815400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ca38c r4:857ca000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85815400 r8:8575d2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85763ac0 INFO: task kworker/0:475:6090 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9d8dc000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763140 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857c9b8c r4:857c9800 r10:61c88647 r9:85816000 r8:8575d32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1001:6095 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1001 state:D stack:0 pid:6095 tgid:6095 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85816c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec5d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:841f4f8c r4:841f4c00 r10:61c88647 r9:85816c00 r8:85758bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8576c580 INFO: task kworker/1:1001:6095 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9dca2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:6097 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6097 tgid:6097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbfdd84 r8:00000002 r7:60000113 r6:ecbfdd8c r5:857fec00 r4:857fec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765f40 r5:00001000 r4:ec3ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:857c9f8c r4:8575d380 Exception stack(0xecbfdfb0 to 0xecbfdff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6100 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc05d84 r8:00000002 r7:60000113 r6:ecc05d8c r5:85818c00 r4:85818c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85818c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec42b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ca78c r4:857ca400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ca78c r4:8575d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818c00 r8:8575d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d400 r8:8027f5e8 r7:ec975e60 r6:85758d00 r5:85818c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e100 INFO: task kworker/0:478:6100 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9e359000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) INFO: task kworker/0:479:6101 blocked for more than 478 seconds. r4:85819800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85819800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857cb38c r4:857cb000 r10:61c88647 r9:85819800 r8:8575d4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1002:6103 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1002 state:D stack:0 pid:6103 tgid:6103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc01d84 r8:00000002 r7:60000113 r6:ecc01d8c r5:8581a400 r4:8581a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585b100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec44d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578b78c r4:8578b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578b78c r4:85758e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581a400 r8:85758e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85758e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758e00 r8:8027f5e8 r7:ecbc9e60 r6:85758e80 r5:8581a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc01fb0 to 0xecc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585b040 INFO: task kworker/1:1002:6103 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9f1be000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:6104 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec489000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857cab8c r4:857ca800 r10:61c88647 r9:8581b000 r8:8575d52c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1003:6107 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1003 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc11d84 r8:00000002 r7:60000113 r6:ecc11d8c r5:8581bc00 r4:8581bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585b640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bf8c r4:8578bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578bf8c r4:85758f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581bc00 r8:85758fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85758f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758f80 r8:8027f5e8 r7:ecbc9e60 r6:8576e000 r5:8581bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585b1c0 INFO: task kworker/1:1003:6107 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9f1be000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:6108 tgid:6108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc15d84 r8:00000002 r7:60000113 r6:ecc15d8c r5:8581c800 r4:8581c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8581c800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857caf8c r4:857cac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8581c800 r8:8575d5ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8581d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cb78c r4:857cb400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cb78c r4:8575d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581d400 r8:8575d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d600 r8:8027f5e8 r7:ecc09e60 r6:8576e100 r5:8581d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e540 INFO: task kworker/0:482:6112 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9f79c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e0529dc0 r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:483 state:D stack:0 pid:6113 tgid:6113 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ec549000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cbb8c r4:857cb800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cbb8c r4:8575d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818000 r8:8575d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d680 r8:8027f5e8 r7:ecc25e60 r6:8576e180 r5:85818000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc29fb0 to 0xecc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e540 INFO: task kworker/0:483:6113 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a0357000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6115 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc31d84 r8:00000002 r7:60000113 r6:ecc31d8c r5:8581ec00 r4:8581ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ed80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8581ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cc78c r4:857cc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cc78c r4:8575d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581ec00 r8:8575d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d700 r8:8027f5e8 r7:ecc29e60 r6:8576e200 r5:8581ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:6116 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:6116 tgid:6116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbf9d84 r8:00000002 r7:60000013 r6:ecbf9d8c r5:85043000 r4:85043000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85043000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r9:83018005 r8:85043000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:00001000 r4:ec577000 r5:857cbf8c r4:857cbc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85043000 r8:8575d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d780 r8:8027f5e8 r7:ecc31e60 r6:8575d800 r5:85043000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e880 INFO: task kworker/0:485:6116 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:6120 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:85044800 r4:85044800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85044800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ec80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85044800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec595000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:857cc38c r4:8575d880 Exception stack(0xecc2dfb0 to 0xecc2dff8) r4:8575eb80 Call trace: 9d20: a0978000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r5:00001000 r4:e03bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:6121 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc39d84 r8:00000002 r7:60000013 r6:ecc39d8c r5:85045400 r4:85045400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85045400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ef40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ccb8c r4:857cc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ccb8c r4:8575d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85045400 r8:8575d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d980 r8:8027f5e8 r7:ecc31e60 r6:8575da00 r5:85045400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575ec00 INFO: task kworker/0:487:6121 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1272000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868380 r5:00001000 r4:ec8bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85046000 r8:8575daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575da80 r8:8027f5e8 r7:ecc39e60 r6:8575db00 r5:85046000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc3dfb0 to 0xecc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575edc0 INFO: task kworker/0:488:6123 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1272000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85046c00 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e280 r5:00001000 r4:ec6c1000 r10:61c88647 r9:85046c00 r8:8575dbac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0529dc0 r5:84b0938c r4:84b09000 r4:00000001 INFO: task kworker/0:490:6126 blocked for more than 478 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r5:00001000 r4:ec85b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cd38c r4:857cd000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cd38c r4:8575dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85040c00 r8:8575dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575dc80 r8:8027f5e8 r7:ecc3de60 r6:8575dd00 r5:85040c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868080 INFO: task kworker/0:490:6126 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1272000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8d3000 r7:dddced80 r6:83018000 r5:857cdb8c r4:8575dd80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec913000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85040000 r8:8575deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575de80 r8:8027f5e8 r7:ecc45e60 r6:8575df00 r5:85040000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc4dfb0 to 0xecc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868580 INFO: task kworker/0:492:6131 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1f7e000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec8f5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85868300 Exception stack(0xe0529d28 to 0xe0529d70) r4:00000000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:857ce78c r4:857ce400 r10:00000000 r9:8586f080 r8:8027f5e8 r7:ecc4de60 r6:8586f100 r5:85030000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:6137 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc59d84 r8:00000002 r7:60000113 r6:ecc59d8c r5:85030c00 r4:85030c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85030c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868b00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ceb8c r4:857ce800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ceb8c r4:8586f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85030c00 r8:8586f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f180 r8:8027f5e8 r7:ecc55e60 r6:8586f200 r5:85030c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc59fb0 to 0xecc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868740 INFO: task kworker/0:495:6137 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a282f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:6139 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec751d84 r8:00000002 r7:60000113 r6:ec751d8c r5:85031800 r4:85031800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018005 r8:85031800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:eb015000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:6141 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:6141 tgid:6141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7b1d84 r8:00000002 r7:60000013 r6:ec7b1d8c r5:85032400 r4:85032400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85032400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85032400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb253000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cf38c r4:857cf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cf38c r4:8586f380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85032400 r8:8586f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586f380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f380 r8:8027f5e8 r7:ec751e60 r6:8586f400 r5:85032400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b1fb0 to 0xec7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868740 INFO: task kworker/0:497:6141 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 9d20: a3532000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857cf78c r4:8586f480 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85034800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb77b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a3dc7000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:6148 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:6148 tgid:6148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:85033000 r4:85033000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85033000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:857d838c r4:8586f680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:6149 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec815d84 r8:00000002 r7:60000013 r6:ec815d8c r5:85035400 r4:85035400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85035400 r4:8291892c r4:00000000 r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb7e5000 r7:dddced80 r6:83018000 r5:857cff8c r4:8586f780 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84b0938c r4:84b09000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:849b0000 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec7c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858d438c r4:8576e280 r10:00000000 r9:8576e280 r8:8027f5e8 r7:ecbc9e60 r6:8586f880 r5:849b0000 r4:84a193c0 Call trace: 9d20: a4353000 ee50b000 00000001 80239b98 7f7b5000 00000001 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85898000 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec755000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:841f538c r4:8576e300 r10:00000000 r9:8576e300 r8:8027f5e8 r7:eca31e60 r6:8576e380 r5:85898000 r4:84a193c0 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a4a19000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:6156 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca2dd84 r8:00000002 r7:60000013 r6:eca2dd8c r5:849b1800 r4:849b1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec681000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d878c r4:857d8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d878c r4:8586f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:8586f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f900 r8:8027f5e8 r7:ec9c9e60 r6:8586f980 r5:849b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858776c0 INFO: task kworker/0:502:6156 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80090013 r4:80239bb0 r4:e0529dc0 r5:00001000 r4:e03bf000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 Workqueue: events bpf_prog_free_deferred r5:849b3c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec805000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857d8b8c r4:8586fa00 r10:00000000 r9:8586fa00 r8:8027f5e8 r7:eca2de60 r6:8586fa80 r5:849b3c00 r4:85877880 Call trace: 9d20: a4a19000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r5:00001000 r4:e03bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d8f8c r4:857d8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d8f8c r4:8586fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:8586fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586fb00 r8:8027f5e8 r7:eca7de60 r6:8586fb80 r5:849b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85877900 INFO: task kworker/0:504:6161 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a4fa0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecabde08 r5:00001000 r4:ecd3b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1007:6164 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1007 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eca3f000 r10:61c88647 r9:849b6000 r8:8576e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84b0938c r4:84b09000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/0:505:6166 blocked for more than 478 seconds. r10:82918930 r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:849b4800 r4:00000000 r5:00001000 r4:ec84d000 r10:61c88647 r9:849b4800 r8:8586fd2c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85877f00 INFO: task kworker/0:505:6166 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a5ed4000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:6168 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec965000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8586fe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Not tainted 6.15.0-syzkaller #0 r4:849b6c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec983000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:507:6172 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:00000000 r5:84b0938c r4:84b09000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Not tainted 6.15.0-syzkaller #0 r5:849b3000 r4:8291892c [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586d640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec997000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d9f8c r4:857d9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d9f8c r4:85871000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3000 r8:8587102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871000 r8:8027f5e8 r7:ecab1e60 r6:85871080 r5:849b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca5dfb0 to 0xeca5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d380 INFO: task kworker/0:508:6173 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a6ca6000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:509:6174 blocked for more than 478 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d9e08 r5:00001000 r4:ec9b5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8586d380 INFO: task kworker/0:509:6174 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a6f41000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r5:00001000 r4:ec9e5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:510:6177 is blocked on a mutex likely owned by task kworker/0:76:3655. r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a6f41000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:6178 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 r5:85830000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec9c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857da78c r4:85871300 Exception stack(0xecb11fb0 to 0xecb11ff8) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586db40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dab8c r4:857da800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dab8c r4:85871400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830c00 r8:8587142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871400 r8:8027f5e8 r7:ecaf1e60 r6:85871480 r5:85830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d9c0 INFO: task kworker/0:512:6181 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a7cbc000 ee50b000 00000001 80239b98 7f7b5000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85831800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 r5:00001000 r4:ec9fb000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecbe5fb0 to 0xecbe5ff8) INFO: task kworker/0:513:6182 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a80d0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a42200 r4:85832400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca49000 r7:dddced80 r6:83018000 r5:857e478c r4:85871600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 r4:85833000 r4:00000000 r5:00001000 r4:eca05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:6187 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:85833c00 r4:85833c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85833c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dbb8c r4:857db800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbb8c r4:85871800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833c00 r8:8587182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871800 r8:8027f5e8 r7:ecbe9e60 r6:85871880 r5:85833c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:516:6187 is blocked on a mutex likely owned by task kworker/0:76:3655. r4:82ac11e4 r5:00001000 r4:e03bf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dbf8c r4:857dbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbf8c r4:85871900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85835400 r8:8587192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871900 r8:8027f5e8 r7:ecbe9e60 r6:85871980 r5:85835400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc61fb0 to 0xecc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Workqueue: events bpf_prog_free_deferred r4:85836000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85836000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc6de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587cf40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85836000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d478c r4:858d4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d478c r4:8576e500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836000 r8:8576e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:84a4a480 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ecc69d84 r8:00000002 r7:60000013 r6:ecc69d8c r5:85836c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85885640 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e4b8c r4:85871b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836c00 r8:85871b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871b00 r8:8027f5e8 r7:ecbe9e60 r6:85871b80 r5:85836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85885580 INFO: task kworker/0:518:6194 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a996a000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:519:6196 blocked for more than 479 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eca69000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r5:00001000 r4:e03bf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:520 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:85838000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:520:6198 is blocked on a mutex likely owned by task kworker/0:76:3655. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:6200 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:6200 tgid:6200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc81d84 r8:00000002 r7:60000013 r6:ecc81d8c r5:8589bc00 r4:8589bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8589bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eca97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857e578c r4:85871e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a42200 r4:8589c800 r4:00000000 r5:00001000 r4:ecaa3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc89fb0 to 0xecc89ff8) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 Exception stack(0xe0529d28 to 0xe0529d70) 9d20: aa6ac000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:6204 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:6204 tgid:6204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc91d84 r8:00000002 r7:60000013 r6:ecc91d8c r5:8589a400 r4:8589a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8589a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc91e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767340 r5:00001000 r4:e473b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:523:6204 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8589d400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r5:00001000 r4:ecabf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:524:6205 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:525 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc9dd84 r8:00000002 r7:60000113 r6:ecc9dd8c r5:8589ec00 r4:8589ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8589ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85885f00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8589ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e638c r4:857e6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e638c r4:85871a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589ec00 r8:85871a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871a00 r8:8027f5e8 r7:ecc91e60 r6:8576e780 r5:8589ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85885b40 INFO: task kworker/0:525:6207 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ab1ba000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r5:80090013 r4:80239bb0 r5:00001000 r4:e03bf000 r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6209 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6209 tgid:6209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc79d84 r8:00000002 r7:60000113 r6:ecc79d8c r5:85838c00 r4:85838c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85838c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858851c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85838c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85838c00 r8:8589302c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:1009:6211 blocked for more than 479 seconds. r4:8583a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r5:00001000 r4:eb8d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:527 state:D stack:0 pid:6213 tgid:6213 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8589e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857671c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8589e000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e6b8c r4:857e6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e6b8c r4:85893100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589e000 r8:8589312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893100 r8:8027f5e8 r7:ecc91e60 r6:8576e880 r5:8589e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca1fb0 to 0xecca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85885cc0 INFO: task kworker/0:527:6213 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: abbfb000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85899800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767480 r5:00001000 r4:eaf43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:857e738c r4:85893200 r4:85893200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893200 r8:8027f5e8 r7:ecc91e60 r6:8576e900 r5:85899800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767100 INFO: task kworker/0:528:6216 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac038000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:6218 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r5:85898c00 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:eb15f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e778c r4:857e7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e778c r4:85893300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85898c00 r8:8589332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893300 r8:8027f5e8 r7:ec8fde60 r6:8576e980 r5:85898c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc19fb0 to 0xecc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767300 INFO: task kworker/0:529:6218 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac20a000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8589b000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 r5:00001000 r4:eb925000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85893280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893280 r8:8027f5e8 r7:ecc19e60 r6:8576ea00 r5:8589b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767380 INFO: task kworker/0:530:6220 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac6ad000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767800 r5:00001000 r4:eb995000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85767780 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac6ad000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:6223 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccb5d84 r8:00000002 r7:60000013 r6:eccb5d8c r5:84990c00 r4:84990c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84990c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec331000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84990c00 r8:8589342c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeccb5fb0 to 0xeccb5ff8) r4:85767700 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0529d28 to 0xe0529d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a4a480 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6225 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6225 tgid:6225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc7dd84 r8:00000002 r7:60000113 r6:ecc7dd8c r5:85839800 r4:85839800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85839800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc7de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85839800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:00001000 r4:eba09000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc7dfb0 to 0xecc7dff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:e03bf000 r4:84a4a480 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ebad5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:534:6227 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:6229 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccc1d84 r8:00000002 r7:60000113 r6:eccc1d8c r5:8583e000 r4:8583e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8583e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8583e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec405000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590cf8c r4:8590cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590cf8c r4:85893680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583e000 r8:858936ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893680 r8:8027f5e8 r7:eccb5e60 r6:85893700 r5:8583e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:536 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec43b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767e40 INFO: task kworker/0:536:6233 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: acf65000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:8583ec00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594c040 r5:00001000 r4:ec47f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8594c080 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) Workqueue: events bpf_prog_free_deferred r5:8583bc00 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec4bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8594c240 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:6239 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecccdd84 r8:00000002 r7:60000113 r6:ecccdd8c r5:8583b000 r4:8583b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8583b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecccde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594c4c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8583b000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590df8c r4:8590dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590df8c r4:85893a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583b000 r8:85893aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893a80 r8:8027f5e8 r7:eccc9e60 r6:85893b00 r5:8583b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecccdfb0 to 0xecccdff8) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd1e08 r5:00001000 r4:ec52f000 r10:61c88647 r9:85850000 r8:85893bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594c340 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:6243 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:6243 tgid:6243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccd9d84 r8:00000002 r7:60000113 r6:eccd9d8c r5:84993000 r4:84993000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84993000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594cbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84993000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590f38c r4:8590f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590f38c r4:85893c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84993000 r8:85893cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893c80 r8:8027f5e8 r7:eccd1e60 r6:8576eb80 r5:84993000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:00000000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:6244 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccddd84 r8:00000002 r7:60000113 r6:eccddd8c r5:84993c00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8594c500 r4:00000000 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a4a480