Extracting prog: 7m15.877061899s Minimizing prog: 1h51m14.628788268s Simplifying prog options: 0s Extracting C: 9m4.110085034s Simplifying C: 58m32.149381399s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="02"], 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="02"], 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h6m6.7653575s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:83236000 r4:83236000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84947640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af7b8c r4:84af7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af7b8c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: a9acb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:3:112 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:112 tgid:112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:833be000 r4:833be000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833be000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3db8c r4:85e3d800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3db8c r4:839cbf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833be000 r8:839cbf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:839cbf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:839cbf00 r8:8027f5e8 r7:df841e60 r6:839cbf80 r5:833be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83b03e00 INFO: task kworker/0:3:112 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa076000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:2:1463 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:1463 tgid:1463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:83b89800 r4:83b89800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b89800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9f800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552378c r4:85523400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8552378c r4:84192080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b89800 r8:841920ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84192080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84192080 r8:8027f5e8 r7:df879e60 r6:84192100 r5:83b89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84190b40 INFO: task kworker/1:2:1463 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa076000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:3:1786 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:1786 tgid:1786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:83b7d400 r4:83b7d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b7d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85124e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac35000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556238c r4:85562000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556238c r4:84268700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b7d400 r8:8426872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84268700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84268700 r8:8027f5e8 r7:df879e60 r6:84268780 r5:83b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84190e00 INFO: task kworker/1:3:1786 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa076000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:1:3095 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df925d84 r8:00000002 r7:60000013 r6:df925d8c r5:83b8c800 r4:83b8c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b8c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df925e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed205000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3df8c r4:85e3dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3df8c r4:843d7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b8c800 r8:843d702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7000 r8:8027f5e8 r7:df83de60 r6:843d7300 r5:83b8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf925fb0 to 0xdf925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f480 INFO: task kworker/0:1:3095 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa643000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:1:3110 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:84206c00 r4:84206c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84206c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84206c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85521b8c r4:85521800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85521b8c r4:8490b780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84206c00 r8:8490b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490b780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490b780 r8:8027f5e8 r7:eac79e60 r6:8490b700 r5:84206c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84925000 INFO: task kworker/1:1:3110 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aa643000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:6:3118 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84203c00 r4:84203c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84203c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851275c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84203c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85119b8c r4:85119800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85119b8c r4:843d7500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84203c00 r8:843d752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7500 r8:8027f5e8 r7:df83de60 r6:8490ba00 r5:84203c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490ff40 INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aabca000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:7:3119 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:84202400 r4:84202400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84202400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b348c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84202400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0a38c r4:84b0a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0a38c r4:843d7580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84202400 r8:843d75ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7580 r8:8027f5e8 r7:df9f5e60 r6:8490ba80 r5:84202400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490fdc0 INFO: task kworker/0:7:3119 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aabca000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:8:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:84200000 r4:84200000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84200000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd1380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84200000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0bf8c r4:84b0bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0bf8c r4:843d7600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84200000 r8:843d762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7600 r8:8027f5e8 r7:df9f5e60 r6:8490bc80 r5:84200000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bdc00 INFO: task kworker/0:8:3122 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aabca000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/0:9:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:83b8a400 r4:83b8a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b8a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3b00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3138c r4:84b31000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3138c r4:843d7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b8a400 r8:843d76ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7680 r8:8027f5e8 r7:df9f5e60 r6:843d7700 r5:83b8a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f080 INFO: task kworker/0:9:3123 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab12a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83b8e000 r4:83b8e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b8e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b32b8c r4:84b32800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b32b8c r4:843d7780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b8e000 r8:843d77ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7780 r8:8027f5e8 r7:df9f5e60 r6:843d7800 r5:83b8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f240 INFO: task kworker/0:10:3125 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab12a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:83a0a400 r4:83a0a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a0a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b3278c r4:84b32400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3278c r4:843d7880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a0a400 r8:843d78ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7880 r8:8027f5e8 r7:df9f5e60 r6:843d7900 r5:83a0a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f340 INFO: task kworker/0:11:3128 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab44c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83af2400 r4:83af2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512db80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b33f8c r4:84b33c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b33f8c r4:843d7980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af2400 r8:843d79ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7980 r8:8027f5e8 r7:df9f5e60 r6:843d7a00 r5:83af2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f3c0 INFO: task kworker/0:12:3130 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab44c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df965d84 r8:00000002 r7:60000113 r6:df965d8c r5:83af3000 r4:83af3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df965e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513b480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af3000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0029000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e138c r4:845e1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e138c r4:843d7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af3000 r8:843d7aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7a80 r8:8027f5e8 r7:dfa31e60 r6:843d7b00 r5:83af3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf965fb0 to 0xdf965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f3c0 INFO: task kworker/0:13:3131 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab825000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:833a6000 r4:833a6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e178c r4:845e1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e178c r4:843d7b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a6000 r8:843d7bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7b80 r8:8027f5e8 r7:df965e60 r6:843d7c00 r5:833a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f740 INFO: task kworker/0:14:3134 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab8de000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3136 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa65d84 r8:00000002 r7:60000013 r6:dfa65d8c r5:833a2400 r4:833a2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849146c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502938c r4:85029000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8502938c r4:843d7c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a2400 r8:843d7cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7c80 r8:8027f5e8 r7:dfa49e60 r6:843d7d00 r5:833a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492f900 INFO: task kworker/0:15:3136 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ab8de000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3138 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:833a0000 r4:833a0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe19000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526d38c r4:8526d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526d38c r4:843d7d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a0000 r8:843d7dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7d80 r8:8027f5e8 r7:dfa65e60 r6:843d7e00 r5:833a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492fb40 INFO: task kworker/0:16:3138 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abc0b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:833a5400 r4:833a5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524338c r4:85243000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524338c r4:843d7e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a5400 r8:843d7eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7e80 r8:8027f5e8 r7:dfa75e60 r6:843d7f00 r5:833a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492fb80 INFO: task kworker/0:17:3140 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abc0b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83236c00 r4:83236c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae47000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524278c r4:85242400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8524278c r4:843d7f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236c00 r8:843d7fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7f80 r8:8027f5e8 r7:dfa81e60 r6:843d7200 r5:83236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492fd00 INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abeed000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:84208c00 r4:84208c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84208c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b92c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84208c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e238c r4:845e2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e238c r4:843d7080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84208c00 r8:843d70ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7080 r8:8027f5e8 r7:dfa81e60 r6:843d7100 r5:84208c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945080 INFO: task kworker/0:19:3144 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abeed000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:8420c800 r4:8420c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8420c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9a480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8420c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85380b8c r4:85380800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85380b8c r4:843d7380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8420c800 r8:843d73ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843d7380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843d7380 r8:8027f5e8 r7:dfaa5e60 r6:83363700 r5:8420c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945080 INFO: task kworker/0:20:3145 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: abeed000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:8420e000 r4:8420e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8420e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7780 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8420e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85382f8c r4:85382c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85382f8c r4:83363680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8420e000 r8:833636ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83363680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027f5e8 r7:dfa5de60 r6:84589880 r5:8420e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945200 INFO: task kworker/0:21:3148 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac3a7000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83244800 r4:83244800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83244800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9aec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83244800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538178c r4:85381400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538178c r4:84589900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83244800 r8:8458992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84589900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84589900 r8:8027f5e8 r7:dfabde60 r6:830b8600 r5:83244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849452c0 INFO: task kworker/0:22:3150 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac572000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:83242400 r4:83242400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85329640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83242400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb499000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85383f8c r4:85383c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85383f8c r4:830b8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830b852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027f5e8 r7:dfabde60 r6:83fa2980 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945680 INFO: task kworker/0:23:3152 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac572000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8420bc00 r4:8420bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8420bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85329180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8420bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea869000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845e3f8c r4:845e3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:845e3f8c r4:830cd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8420bc00 r8:830cd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027f5e8 r7:dfab1e60 r6:830cd080 r5:8420bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849457c0 INFO: task kworker/0:24:3154 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac968000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3156 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaf1d84 r8:00000002 r7:60000013 r6:dfaf1d8c r5:84203000 r4:84203000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84203000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84203000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497038c r4:84970000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497038c r4:830cd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84203000 r8:830cd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd400 r8:8027f5e8 r7:dfad5e60 r6:8490b180 r5:84203000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945900 INFO: task kworker/0:25:3156 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ac968000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:84205400 r4:84205400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84205400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85716540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84205400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb989000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567c78c r4:8567c400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567c78c r4:830cd380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84205400 r8:830cd3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd380 r8:8027f5e8 r7:dfaf1e60 r6:8490bd80 r5:84205400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945a00 INFO: task kworker/0:26:3158 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: acb4c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb09d84 r8:00000002 r7:60000013 r6:dfb09d8c r5:833b6000 r4:833b6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833b6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497078c r4:84970400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497078c r4:832a1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833b6000 r8:832a12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1280 r8:8027f5e8 r7:dfafde60 r6:8490b080 r5:833b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945cc0 INFO: task kworker/0:27:3160 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: acb4c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3165 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83ba1800 r4:83ba1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717140 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb983000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f5b8c r4:841f5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f5b8c r4:8490bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba1800 r8:8490bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490bf00 r8:8027f5e8 r7:eac79e60 r6:8490b880 r5:83ba1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19100 INFO: task kworker/1:4:3165 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ace6b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3166 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:83ba3c00 r4:83ba3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f7f8c r4:841f7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f7f8c r4:8490b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba3c00 r8:8490b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490b980 r8:8027f5e8 r7:dfb15e60 r6:8490b480 r5:83ba3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19100 INFO: task kworker/1:5:3166 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ace6b000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3170 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83ba5400 r4:83ba5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573a240 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba5400 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc78c r4:855fc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fc78c r4:8490bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba5400 r8:8490bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490bf80 r8:8027f5e8 r7:dfb15e60 r6:8490b300 r5:83ba5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19480 INFO: task kworker/1:6:3170 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad1f8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3171 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:83b99800 r4:83b99800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b99800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85948600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b99800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec39f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d4b8c r4:858d4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d4b8c r4:84458b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b99800 r8:84458bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84458b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84458b80 r8:8027f5e8 r7:dfb39e60 r6:83f8b380 r5:83b99800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a196c0 INFO: task kworker/1:7:3171 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad1f8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:83adc800 r4:83adc800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adc800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83adc800 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567eb8c r4:8567e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567eb8c r4:832a1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adc800 r8:832a122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1200 r8:8027f5e8 r7:dfafde60 r6:8336bf00 r5:83adc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945f80 INFO: task kworker/0:28:3173 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad473000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83ad9800 r4:83ad9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3d38c r4:85e3d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3d38c r4:8336be80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad9800 r8:8336beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8336be80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8336be80 r8:8027f5e8 r7:dfae1e60 r6:8336b980 r5:83ad9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84945f80 INFO: task kworker/0:29:3174 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad7dc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:84212400 r4:84212400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84212400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ce80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84212400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578ab8c r4:8578a800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578ab8c r4:848cbf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84212400 r8:848cbfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cbf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cbf80 r8:8027f5e8 r7:dfb45e60 r6:8336b900 r5:84212400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a193c0 INFO: task kworker/1:8:3176 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ad7dc000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb65d84 r8:00000002 r7:60000013 r6:dfb65d8c r5:84830c00 r4:84830c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585ba80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bb8c r4:8578b800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578bb8c r4:848cba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:848cbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848cba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848cba80 r8:8027f5e8 r7:dfb45e60 r6:83358300 r5:84830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19900 INFO: task kworker/1:9:3178 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adf46000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84830000 r4:84830000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859c68c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84830000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d4f8c r4:858d4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d4f8c r4:84a18000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:84a1802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18000 r8:8027f5e8 r7:dfb45e60 r6:83358000 r5:84830000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19a00 INFO: task kworker/1:10:3181 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adf46000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b9b000 r4:83b9b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fbb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d578c r4:858d5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d578c r4:84a18080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9b000 r8:84a180ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18080 r8:8027f5e8 r7:dfb81e60 r6:84a18100 r5:83b9b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19bc0 INFO: task kworker/1:11:3183 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: adf46000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83b9d400 r4:83b9d400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9d400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fba40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb451000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d538c r4:858d5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d538c r4:84a18180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9d400 r8:84a181ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18180 r8:8027f5e8 r7:dfb2de60 r6:84a18200 r5:83b9d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19bc0 INFO: task kworker/1:12:3184 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ae1c8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83b9c800 r4:83b9c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a20d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec905000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d738c r4:858d7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d738c r4:84a18280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9c800 r8:84a182ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18280 r8:8027f5e8 r7:dfb61e60 r6:84a18300 r5:83b9c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944000 INFO: task kworker/1:13:3187 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: ae1c8000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83b9bc00 r4:83b9bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b9bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae4d00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed127000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af8f8c r4:85af8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af8f8c r4:84a18380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b9bc00 r8:84a183ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18380 r8:8027f5e8 r7:dfb8de60 r6:84a18400 r5:83b9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944000 INFO: task kworker/1:14:3188 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb5e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:83ba6000 r4:83ba6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ace040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb239000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8b8c r4:841f8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f8b8c r4:84a18480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba6000 r8:84a184ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18480 r8:8027f5e8 r7:dfb99e60 r6:84a18500 r5:83ba6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944000 INFO: task kworker/1:15:3189 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb5e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84833000 r4:84833000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84833000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc8c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bf178c r4:85bf1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf178c r4:84940000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:8494002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84940000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84940000 r8:8027f5e8 r7:dfb49e60 r6:84940080 r5:84833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84941980 INFO: task kworker/0:30:3191 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: aeb5e000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83afbc00 r4:83afbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83afbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae4a40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83afbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb937000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af978c r4:85af9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af978c r4:84a18580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83afbc00 r8:84a185ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18580 r8:8027f5e8 r7:dfb99e60 r6:84a18600 r5:83afbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849442c0 INFO: task kworker/1:16:3193 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:83af8c00 r4:83af8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae6480 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83af8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdfb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af9b8c r4:85af9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af9b8c r4:84a18680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af8c00 r8:84a186ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18680 r8:8027f5e8 r7:dfba5e60 r6:84a18700 r5:83af8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944340 INFO: task kworker/1:17:3194 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83afd400 r4:83afd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83afd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae6980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83afd400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afa38c r4:85afa000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afa38c r4:84a18780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83afd400 r8:84a187ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18780 r8:8027f5e8 r7:dfbc9e60 r6:84a18800 r5:83afd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944340 INFO: task kworker/1:18:3196 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbd9d84 r8:00000002 r7:60000013 r6:dfbd9d8c r5:83ba2400 r4:83ba2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ba2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae6580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af9f8c r4:85af9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af9f8c r4:84a18880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ba2400 r8:84a188ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18880 r8:8027f5e8 r7:dfbcde60 r6:84a18900 r5:83ba2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849442c0 INFO: task kworker/1:19:3199 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af000000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:83af9800 r4:83af9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b4e740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83af9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed28d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa3f8c r4:85aa3c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa3f8c r4:84a18980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af9800 r8:84a189ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18980 r8:8027f5e8 r7:dfbcde60 r6:84a18a00 r5:83af9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944bc0 INFO: task kworker/1:20:3203 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af52c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84834800 r4:84834800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84834800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849443c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84834800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afa78c r4:85afa400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afa78c r4:84a18a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84834800 r8:84a18aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18a80 r8:8027f5e8 r7:dfbede60 r6:84940100 r5:84834800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84944c80 INFO: task kworker/1:21:3204 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: af52c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc21d84 r8:00000002 r7:60000013 r6:dfc21d8c r5:84836000 r4:84836000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84836000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b52b40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84836000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed299000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa838c r4:85aa8000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aa838c r4:84a18b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836000 r8:84a18b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18b00 r8:8027f5e8 r7:dfc05e60 r6:84940180 r5:84836000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a19700 INFO: task kworker/1:22:3207 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: afeef000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbaf80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84831800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec307000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afaf8c r4:85afac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afaf8c r4:84a18b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:84a18bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18b80 r8:8027f5e8 r7:dfc05e60 r6:84940200 r5:84831800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84944f40 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:24:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:83afe000 r4:83afe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83afe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbad00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83afe000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dfbbf000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:25:3212 blocked for more than 451 seconds. r5:84840000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec431000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afb38c r4:85afb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afb38c r4:84a18d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84840000 r8:84a18d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18d00 r8:8027f5e8 r7:dfc25e60 r6:84a18d80 r5:84840000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938080 INFO: task kworker/1:25:3212 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0302000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Exception stack(0xe055dfb0 to 0xe055dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84840c00 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec4e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85afb78c r4:84a18e00 Exception stack(0xdfc3dfb0 to 0xdfc3dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:e055ddc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:84841800 r4:84841800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84841800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf0c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84841800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec919000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f978c r4:841f9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f978c r4:84a18f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84841800 r8:84a18f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a18f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a18f00 r8:8027f5e8 r7:dfc3de60 r6:84a18f80 r5:84841800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938180 INFO: task kworker/1:27:3216 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b04bb000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r9:83018205 r8:84833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:00001000 r4:ec5a1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd20: b0a1f000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84836c00 r4:84836c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84836c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dbf540 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e3d78c r4:85e3d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e3d78c r4:84940380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836c00 r8:849403ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84940380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84940380 r8:8027f5e8 r7:dfb49e60 r6:84940400 r5:84836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: b0a1f000 dfe07000 00000001 80239b98 7f7af000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84832400 r4:84832400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84832400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae4c40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84832400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afbf8c r4:85afbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afbf8c r4:84931080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:849310ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931080 r8:8027f5e8 r7:dfbb1e60 r6:84940580 r5:84832400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938700 INFO: task kworker/1:29:3223 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc8dd84 r8:00000002 r7:60000113 r6:dfc8dd8c r5:849d0000 r4:849d0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f938c r4:841f9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:841f938c r4:84931100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0000 r8:8493112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931100 r8:8027f5e8 r7:dfbb1e60 r6:84940600 r5:849d0000 Exception stack(0xdfc8dfb0 to 0xdfc8dff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 INFO: task kworker/1:31:3227 blocked for more than 451 seconds. r5:849d0c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecbb7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred dd20: b0f43000 dfe07000 00000001 80239b98 7f7af000 00000001 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecc21000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1078c r4:85b10400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1078c r4:84931280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d1800 r8:849312ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931280 r8:8027f5e8 r7:dfc91e60 r6:84940700 r5:849d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938c00 INFO: task kworker/1:32:3231 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b14e0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:849d2400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfe80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12b8c r4:85b12800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b12b8c r4:84931300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d2400 r8:8493132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931300 r8:8027f5e8 r7:dfcc1e60 r6:84940780 r5:849d2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:849d4800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf600 r5:00001000 r4:ecddd000 r7:ddde2d80 r6:83018200 r5:85b10b8c r4:84931380 Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3236 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:849d3000 r4:849d3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf700 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b10f8c r4:85b10c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b10f8c r4:84931400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d3000 r8:8493142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931400 r8:8027f5e8 r7:dfcc9e60 r6:84940880 r5:849d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938d00 INFO: task kworker/1:35:3236 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1a3a000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecfb5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938e80 INFO: task kworker/1:36:3237 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b1e55000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:849d6c00 r4:849d6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfd00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfcb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1278c r4:85b12400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1278c r4:84931500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d6c00 r8:8493152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931500 r8:8027f5e8 r7:dfce1e60 r6:84940980 r5:849d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a0c0 INFO: task kworker/1:37:3240 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2368000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3241 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:849d5400 r4:849d5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed18f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b13f8c r4:85b13c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b13f8c r4:84931580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d5400 r8:849315ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931580 r8:8027f5e8 r7:dfce1e60 r6:84940a00 r5:849d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a0c0 INFO: task kworker/1:38:3241 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2368000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:845d0c00 r4:845d0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfb40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b11f8c r4:85b11c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b11f8c r4:84931600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d0c00 r8:8493162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931600 r8:8027f5e8 r7:dfd05e60 r6:84940a80 r5:845d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a280 INFO: task kworker/1:39:3243 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b2786000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3245 blocked for more than 451 seconds. Call trace: [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecf7b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred dd20: b2786000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:845d3000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcff80 r5:00001000 r4:ecff3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84931700 r8:8027f5e8 r7:dfd05e60 r6:84940b80 r5:845d3000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85b1338c r4:84931780 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:84843c00 r4:84843c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84843c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bba740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed01d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1378c r4:85b13400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1378c r4:84931800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84843c00 r8:8493182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931800 r8:8027f5e8 r7:dfd05e60 r6:84931880 r5:84843c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492a700 INFO: task kworker/1:43:3251 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3047000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:84845400 r4:00000000 r4:00000000 r5:00001000 r4:ed033000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3256 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:845d3c00 r4:845d3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b15b8c r4:85b15800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b15b8c r4:84931a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d3c00 r8:84931a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931a00 r8:8027f5e8 r7:dfd05e60 r6:84940c80 r5:845d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492ab80 INFO: task kworker/1:45:3256 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:845d5400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed19d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1438c r4:85b14000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1438c r4:84931a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d5400 r8:84931aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931a80 r8:8027f5e8 r7:dfa1de60 r6:84940d00 r5:845d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492ac80 INFO: task kworker/1:46:3257 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b34b1000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:845d6000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed1ab000 r5:85b1478c r4:85b14400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:48:3262 blocked for more than 451 seconds. [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0580 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b14b8c r4:85b14800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b14b8c r4:84931b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d6c00 r8:84931bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931b80 r8:8027f5e8 r7:dfa1de60 r6:84940e00 r5:845d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84938840 INFO: task kworker/1:48:3262 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b3d3c000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:845d2400 r4:845d2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b14f8c r4:85b14c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b14f8c r4:84931c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d2400 r8:84931c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931c00 r8:8027f5e8 r7:dfa1de60 r6:84940e80 r5:845d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8492ac80 r4:00000000 dd20: b4172000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r5:00001000 r4:ed1db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:51 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed1eb000 r7:ddde2d80 r6:83018200 r5:85b1578c r4:84931d00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3269 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84801800 r4:84801800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84801800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84801800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed211000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b15f8c r4:85b15c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b15f8c r4:84931d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84801800 r8:84931dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931d80 r8:8027f5e8 r7:dfa1de60 r6:846f7000 r5:84801800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:84a53d80 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3274 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:84803000 r4:84803000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84803000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bd0c80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84803000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r5:00001000 r4:ed231000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85b1678c r4:84931e00 Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84803c00 r4:8291892c r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:848f5380 Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b47e0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3278 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84804800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed257000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b16f8c r4:85b16c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b16f8c r4:84931f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84804800 r8:84931f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931f00 r8:8027f5e8 r7:dfaf9e60 r6:846f7280 r5:84804800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd2dfb0 to 0xdfd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f5800 INFO: task kworker/1:55:3278 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b4df0000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84805400 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ed23f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85b16b8c r4:84931f80 r4:84931f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 r5:84af0b8c r4:84af0800 r4:84a53d80 r4:00000001 r4:84a51100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85baa040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84806000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed287000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b17b8c r4:85b17800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b17b8c r4:8491b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84806000 r8:8491b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b000 r8:8027f5e8 r7:dfd2de60 r6:846f7380 r5:84806000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd45fb0 to 0xdfd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f5840 INFO: task kworker/1:57:3282 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b50d4000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 r5:00001000 r4:ed265000 r7:ddde2d80 r6:83018200 r5:85b1738c r4:8491b080 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3286 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:845d4800 r4:845d4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:845d4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcff00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed273000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1778c r4:85b17400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1778c r4:8491b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d4800 r8:8491b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b100 r8:8027f5e8 r7:dfd45e60 r6:846f7480 r5:845d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f5c80 INFO: task kworker/1:59:3286 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: b5714000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:60 state:D stack:0 pid:3294 tgid:3294 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2af000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8491b180 r8:8027f5e8 r7:dfd45e60 r6:846f7500 r5:84981800 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:84846000 r4:84846000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84846000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85baa300 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84846000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed295000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b17f8c r4:85b17c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b17f8c r4:8491b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84846000 r8:8491b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b200 r8:8027f5e8 r7:dfb89e60 r6:8491b280 r5:84846000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f9b100 INFO: task kworker/1:61:3295 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: b5cc7000 dfe07000 00000001 80239b98 7f7af000 00000001 r4:00000000 r5:84af0b8c r4:84af0800 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:84844800 r4:84844800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84844800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85baa440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1838c r4:85b18000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1838c r4:8491b300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84844800 r8:8491b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b300 r8:8027f5e8 r7:dfb89e60 r6:8491b380 r5:84844800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f9b100 INFO: task kworker/1:62:3296 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b5cc7000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r4:e055ddc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 r4:84843000 r4:00000000 r4:00000000 r5:00001000 r4:ed387000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b18b8c r4:85b18800 r4:8491b400 Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f9b100 INFO: task kworker/1:63:3297 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b60fd000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3598 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84766c00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b34040 r5:00001000 r4:e06a9000 r5:84b09b8c r4:84b09800 r10:61c88647 r9:84766c00 r8:84a9d8ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:3671 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:3671 tgid:3671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:84abe000 r4:84abe000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84abe000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abe000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af138c r4:84af1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af138c r4:84a53e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abe000 r8:84a53eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53e80 r8:8027f5e8 r7:e055de60 r6:84a53f00 r5:84abe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:206:3671 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6849000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ab0000 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e03d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84ab0000 r8:84a53fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 INFO: task kworker/1:207:3672 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6849000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af0b8c r4:84af0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af0b8c r4:84a53d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a53d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3674 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0549d84 r8:00000002 r7:60000113 r6:e0549d8c r5:847bbc00 r4:847bbc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bbc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e06a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0978c r4:84a4a500 Exception stack(0xe0549fb0 to 0xe0549ff8) task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:e055ddc0 r5:00001000 r4:e03b1000 r10:61c88647 r9:84abbc00 r8:84a53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84a51100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3676 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3676 tgid:3676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e056dd84 r8:00000002 r7:60000013 r6:e056dd8c r5:847bd400 r4:847bd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e056de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af178c r4:84af1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84af178c r4:84a43080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bd400 r8:84a430ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a43080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a43080 r8:8027f5e8 r7:e0561e60 r6:84a4a600 r5:847bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe056dfb0 to 0xe056dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a51480 INFO: task kworker/1:208:3676 is blocked on a mutex likely owned by task kworker/1:205:3669. task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84abbc00 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84abbc00 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: b6efa000 dfe07000 00000001 80239b98 7f7af000 00000001 dd40: 82ac05a0 7f7af000 dfe07000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a51040 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a53d80 r8:8027f5e8 r7:e0555e60 r6:84a53e00 r5:84abbc00 Not tainted 6.15.0-syzkaller #0 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:e0405000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a43100 r8:8027f5e8 r7:e056de60 r6:84a4a680 r5:847be000 task:kworker/1:205 state:R running task stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: <> mon.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:5909 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:973 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec4b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578038c r4:85780000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578038c r4:856ff800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e4800 r8:856ff82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:856ff800 r8:8027f5e8 r7:ec8ade60 r6:856ff880 r5:856e4800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:5911 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec825d84 r8:00000002 r7:60000013 r6:ec825d8c r5:8476b000 r4:8476b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578078c r4:85780400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578078c r4:856ff900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:856ff92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ff900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ff900 r8:8027f5e8 r7:ec8b5e60 r6:8573bb00 r5:8476b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711100 INFO: task kworker/1:974:5911 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f0c2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 task:kworker/1:975 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r5:00001000 r4:ec4db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85780b8c r4:856ff980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711680 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85780f8c r4:85780c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85780f8c r4:856ffa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:856ffa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffa00 r8:8027f5e8 r7:ec885e60 r6:8573bc00 r5:8476d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711400 INFO: task kworker/1:976:5915 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f3e0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:977:5917 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:977 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:8476c800 r4:8476c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711c00 r5:00001000 r4:ec59f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85781f8c r4:85781c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85781f8c r4:856ffa80 r4:856ffa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffa80 r8:8027f5e8 r7:ec8bde60 r6:8573bc80 r5:8476c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711480 INFO: task kworker/1:977:5917 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f3e0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:5918 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:5918 tgid:5918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8c9d84 r8:00000002 r7:60000013 r6:ec8c9d8c r5:8476ec00 r4:8476ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857117c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8476ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec547000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578138c r4:85781000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578138c r4:856ffb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476ec00 r8:856ffb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffb00 r8:8027f5e8 r7:ec8c5e60 r6:8573bd00 r5:8476ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85711480 INFO: task kworker/1:978:5918 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f595000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:5920 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8d1d84 r8:00000002 r7:60000013 r6:ec8d1d8c r5:849a0c00 r4:849a0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711940 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:00001000 r4:ec55f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849a0c00 r8:856ffbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r4:e0529dc0 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/1:980:5922 blocked for more than 475 seconds. r4:856e1800 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec583000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85781b8c r4:85781800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85781b8c r4:856ffc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e1800 r8:856ffc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffc00 r8:8027f5e8 r7:ec8c5e60 r6:856ffc80 r5:856e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec89dfb0 to 0xec89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711980 INFO: task kworker/1:980:5922 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f97c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:5925 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:5925 tgid:5925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:856e5400 r4:856e5400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e5400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578238c r4:85782000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578238c r4:856ffd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e5400 r8:856ffd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffd00 r8:8027f5e8 r7:ec8c5e60 r6:856ffd80 r5:856e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d9fb0 to 0xec8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711a80 INFO: task kworker/1:981:5925 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8f97c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:5927 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8ddd84 r8:00000002 r7:60000013 r6:ec8ddd8c r5:856e6000 r4:856e6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec697000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578278c r4:85782400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578278c r4:856ffe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6000 r8:856ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ffe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ffe00 r8:8027f5e8 r7:ec8d9e60 r6:856ffe80 r5:856e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711bc0 INFO: task kworker/1:982:5927 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8fbf2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:983:5929 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:983 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:856e6c00 r4:856e6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85711180 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782b8c r4:85782800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85782b8c r4:856fff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6c00 r8:856fff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856fff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856fff00 r8:8027f5e8 r7:ec8dde60 r6:856fff80 r5:856e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711cc0 INFO: task kworker/1:983:5929 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8fdb3000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 INFO: task kworker/1:984:5931 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:856e0c00 r4:856e0c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e0c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f4040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782f8c r4:85782c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85782f8c r4:856f5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0c00 r8:856f502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5000 r8:8027f5e8 r7:ec8e1e60 r6:856f5080 r5:856e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85711cc0 INFO: task kworker/1:984:5931 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 8fdb3000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:985 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec8ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578338c r4:85783000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578338c r4:856f5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856de000 r8:856f512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5100 r8:8027f5e8 r7:ec8e5e60 r6:856f5180 r5:856de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f41c0 INFO: task kworker/1:985:5933 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:e0529dc0 r5:00001000 r4:e03bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec903000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783b8c r4:85783800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85783b8c r4:856f5200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8000 r8:856f522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5200 r8:8027f5e8 r7:ec8e9e60 r6:856f5280 r5:856e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8edfb0 to 0xec8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f41c0 INFO: task kworker/1:986:5935 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 902c5000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:84b0938c r4:84b09000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec8f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8578378c r4:85783400 r4:856f5300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a42200 INFO: task kworker/1:988:5939 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:5939 tgid:5939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:856e9800 r4:856e9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f47c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783f8c r4:85783c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85783f8c r4:856f5400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e9800 r8:856f542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5400 r8:8027f5e8 r7:ec8ede60 r6:856f5480 r5:856e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f4400 INFO: task kworker/1:988:5939 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9057f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0529fb0 to 0xe0529ff8) r5:856eb000 r4:8291892c r5:00001000 r4:ec93f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:856f5500 r8:8027f5e8 r7:ec901e60 r6:856f5580 r5:856eb000 Exception stack(0xe0529d28 to 0xe0529d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:990 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f4980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec917000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578838c r4:85788000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578838c r4:856f5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:856f562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5600 r8:8027f5e8 r7:ec90de60 r6:856f5680 r5:856ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f4640 INFO: task kworker/1:990:5942 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 90bfd000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:856f5700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec309000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578b38c r4:8578b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578b38c r4:856f5800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ebc00 r8:856f582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5800 r8:8027f5e8 r7:ec90de60 r6:856f5880 r5:856ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f4c40 INFO: task kworker/1:992:5948 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 915e8000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:993:5949 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:993 state:D stack:0 pid:5949 tgid:5949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec935d84 r8:00000002 r7:60000013 r6:ec935d8c r5:856ed400 r4:856ed400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ed400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fdd80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788f8c r4:85788c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85788f8c r4:856f5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ed400 r8:856f592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5900 r8:8027f5e8 r7:ec949e60 r6:856f5980 r5:856ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856fdb40 INFO: task kworker/1:993:5949 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 915e8000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:5951 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec959d84 r8:00000002 r7:60000113 r6:ec959d8c r5:857e8000 r4:857e8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2bc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578938c r4:85789000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578938c r4:856f5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e8000 r8:856f5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5a00 r8:8027f5e8 r7:ec949e60 r6:856f5a80 r5:857e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2040 INFO: task kworker/1:994:5951 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 915e8000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5952 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5952 tgid:5952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec969d84 r8:00000002 r7:60000113 r6:ec969d8c r5:857e9800 r4:857e9800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e9800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec969e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567f38c r4:8567f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567f38c r4:8573be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e9800 r8:8573be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573be00 r8:8027f5e8 r7:ec891e60 r6:856f5b00 r5:857e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec969fb0 to 0xec969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701ec0 INFO: task kworker/0:413:5952 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9201d000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:5954 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:5954 tgid:5954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec96dd84 r8:00000002 r7:60000113 r6:ec96dd8c r5:857ea400 r4:857ea400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ea400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857016c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567e78c r4:8567e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567e78c r4:8573be80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ea400 r8:8573beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573be80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573be80 r8:8027f5e8 r7:ec969e60 r6:856f5b80 r5:857ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec96dfb0 to 0xec96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701ec0 INFO: task kworker/0:414:5954 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9201d000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:5955 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec97dd84 r8:00000002 r7:60000113 r6:ec97dd8c r5:857ebc00 r4:857ebc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ebc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec97de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567ef8c r4:8567ec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567ef8c r4:8573bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ebc00 r8:8573bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573bf00 r8:8027f5e8 r7:ec969e60 r6:856f5c00 r5:857ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec97dfb0 to 0xec97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85701bc0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92542000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5959 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5959 tgid:5959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec921d84 r8:00000002 r7:60000013 r6:ec921d8c r5:849a2400 r4:849a2400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a2400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6280 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567f78c r4:8567f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567f78c r4:8573bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a2400 r8:8573bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8573bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8573bf80 r8:8027f5e8 r7:ec969e60 r6:85643000 r5:849a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85701500 INFO: task kworker/0:416:5959 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92542000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:5962 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:5962 tgid:5962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7c9d84 r8:00000002 r7:60000113 r6:ec7c9d8c r5:857e8c00 r4:857e8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6800 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84970f8c r4:84970c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84970f8c r4:85643080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e8c00 r8:856430ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643080 r8:8027f5e8 r7:ec921e60 r6:856f5c80 r5:857e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c9fb0 to 0xec7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6100 INFO: task kworker/0:417:5962 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92793000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:5963 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:5963 tgid:5963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7d5d84 r8:00000002 r7:60000013 r6:ec7d5d8c r5:857ec800 r4:857ec800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ec800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567fb8c r4:8567f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567fb8c r4:85643100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ec800 r8:8564312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643100 r8:8027f5e8 r7:ec7c9e60 r6:856f5d00 r5:857ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6100 INFO: task kworker/0:418:5963 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92cce000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:995:5966 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:995 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7a5d84 r8:00000002 r7:60000113 r6:ec7a5d8c r5:857ed400 r4:857ed400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ed400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2d40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578978c r4:85789400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578978c r4:856f5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ed400 r8:856f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5d80 r8:8027f5e8 r7:ec949e60 r6:856f5e00 r5:857ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a5fb0 to 0xec7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2a40 INFO: task kworker/1:995:5966 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 92cce000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:996:5968 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:996 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:857ee000 r4:857ee000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ee000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2e40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb789000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85789b8c r4:85789800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85789b8c r4:856f5e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ee000 r8:856f5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f5e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f5e80 r8:8027f5e8 r7:ec949e60 r6:856f5f00 r5:857ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2d80 INFO: task kworker/1:996:5968 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 931a1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:419 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ede08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f66c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567ff8c r4:8567fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567ff8c r4:85643180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857eb000 r8:856431ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643180 r8:8027f5e8 r7:ec7c9e60 r6:856f5f80 r5:857eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7edfb0 to 0xec7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6540 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:5972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7f9d84 r8:00000002 r7:60000113 r6:ec7f9d8c r5:856eec00 r4:856eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec81d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85789f8c r4:85789c00 r7:ddde2d80 r6:83018200 r5:85789f8c r4:856f9000 r4:856f9000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856f2f00 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0529d28 to 0xe0529d70) 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:420:5975 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb915000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84970b8c r4:84970800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84970b8c r4:85643200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0c00 r8:8564322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643200 r8:8027f5e8 r7:ec7c9e60 r6:856f9100 r5:857f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec821fb0 to 0xec821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6680 INFO: task kworker/0:420:5975 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 93d5f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:421 state:D stack:0 pid:5977 tgid:5977 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r5:00001000 r4:ec5d7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85643280 r8:8027f5e8 r7:ec821e60 r6:856f9180 r5:857f2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f68c0 INFO: task kworker/0:421:5977 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 943e9000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5979 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec981d84 r8:00000002 r7:60000113 r6:ec981d8c r5:857f3c00 r4:857f3c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f3c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6380 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec831000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b9f8c r4:857b9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b9f8c r4:85643300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3c00 r8:8564332c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85643300 r8:8027f5e8 r7:ec841e60 r6:856f9200 r5:857f3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:e0529dc0 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:423 state:D stack:0 pid:5981 tgid:5981 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec655000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b878c r4:857b8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b878c r4:85643380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f1800 r8:856433ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643380 r8:8027f5e8 r7:ec981e60 r6:856f9280 r5:857f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6a00 INFO: task kworker/0:423:5981 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 94792000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:5982 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:5982 tgid:5982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec98dd84 r8:00000002 r7:60000013 r6:ec98dd8c r5:857f4800 r4:857f4800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f4800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec66f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b8b8c r4:857b8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b8b8c r4:85643400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f4800 r8:8564342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643400 r8:8027f5e8 r7:ec981e60 r6:856f9300 r5:857f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6a00 INFO: task kworker/0:424:5982 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 94bf0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:5984 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec995d84 r8:00000002 r7:60000013 r6:ec995d8c r5:857f3000 r4:857f3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6e80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec689000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b8f8c r4:857b8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b8f8c r4:85643480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3000 r8:856434ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643480 r8:8027f5e8 r7:ec981e60 r6:856f9380 r5:857f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6f00 INFO: task kworker/0:425:5984 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9508f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:5986 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec99dd84 r8:00000002 r7:60000013 r6:ec99dd8c r5:857f6000 r4:857f6000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6f40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec797000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b938c r4:857b9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b938c r4:85643500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6000 r8:8564352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643500 r8:8027f5e8 r7:ec981e60 r6:856f9400 r5:857f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6d00 INFO: task kworker/0:426:5986 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9508f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:427 state:D stack:0 pid:5988 tgid:5988 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r9:83018005 r8:857f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:00001000 r4:ec7b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b978c r4:857b9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b978c r4:85643580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f5400 r8:856435ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643580 r8:8027f5e8 r7:ec981e60 r6:856f9480 r5:857f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f6dc0 INFO: task kworker/0:427:5988 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 95515000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:5989 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:5989 tgid:5989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9a9d84 r8:00000002 r7:60000013 r6:ec9a9d8c r5:857f0000 r4:857f0000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f0000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b9b8c r4:857b9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857b9b8c r4:85643600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0000 r8:8564362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643600 r8:8027f5e8 r7:ec981e60 r6:856f9500 r5:857f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a9fb0 to 0xec9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2c40 INFO: task kworker/0:428:5989 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 95515000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:5992 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:998 state:D stack:0 pid:5992 tgid:5992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7e1d84 r8:00000002 r7:60000113 r6:ec7e1d8c r5:857f6c00 r4:857f6c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85745b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb81000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a38c r4:8578a000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578a38c r4:856f9580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6c00 r8:856f95ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f9580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f9580 r8:8027f5e8 r7:ec949e60 r6:856f9600 r5:857f6c00 Exception stack(0xec7e1fb0 to 0xec7e1ff8) r4:8571b800 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:856ee000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec9ad000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ba38c r4:857ba000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ba38c r4:85643680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ee000 r8:856436ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643680 r8:8027f5e8 r7:ec981e60 r6:856f9680 r5:856ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2780 INFO: task kworker/0:429:5994 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 95a01000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:5996 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:5996 tgid:5996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9bdd84 r8:00000002 r7:60000013 r6:ec9bdd8c r5:857eec00 r4:857eec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857eec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9bde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571e0c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ba78c r4:857ba400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ba78c r4:85643700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857eec00 r8:8564372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643700 r8:8027f5e8 r7:ec9b1e60 r6:856f9700 r5:857eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856f2180 INFO: task kworker/0:430:5996 is blocked on a mutex likely owned by task kworker/0:76:3655. r4:00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5998 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:5998 tgid:5998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9d5d84 r8:00000002 r7:60000013 r6:ec9d5d8c r5:857f8c00 r4:857f8c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571e400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857baf8c r4:857bac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857baf8c r4:85643780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8c00 r8:856437ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643780 r8:8027f5e8 r7:ec9bde60 r6:856f9780 r5:857f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d5fb0 to 0xec9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8571e1c0 INFO: task kworker/0:431:5998 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 965dc000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857fb000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r5:00001000 r4:ec9c5000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85643800 r8:8027f5e8 r7:ec9d5e60 r6:856f9800 r5:857fb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 96a16000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:857f9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec9e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857bb38c r4:85643880 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8571e200 INFO: task kworker/0:433:6002 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 96c3c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:6005 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:6005 tgid:6005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:857fa400 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca01000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85643900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6006 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:857fc800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:00001000 r4:ec9f1000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeca0dfb0 to 0xeca0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:6008 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca1dd84 r8:00000002 r7:60000013 r6:eca1dd8c r5:857fd400 r4:857fd400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fd400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ea80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca25000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857bc38c r4:857bc000 r7:dddced80 r6:83018000 r5:857bc38c r4:85643a00 Exception stack(0xeca1dfb0 to 0xeca1dff8) r4:8571e6c0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:857fbc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bbf8c r4:857bbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bbf8c r4:85643a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:85643aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643a80 r8:8027f5e8 r7:eca1de60 r6:856f9a80 r5:857fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8571e7c0 INFO: task kworker/0:437:6009 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 970b1000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca3dd84 r8:00000002 r7:60000013 r6:eca3dd8c r5:857f8000 r4:857f8000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ebc0 r5:00001000 r4:eca35000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857bc78c r4:85643b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8000 r8:85643b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85643b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85643b00 r8:8027f5e8 r7:eca1de60 r6:856f9b00 r5:857f8000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r5:00001000 r4:ecac5000 r10:61c88647 r9:85800c00 r8:85643bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:61c88647 r9:85801800 r8:85643c2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 97495000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 r5:00001000 r4:e03bf000 r4:00000001 Workqueue: events bpf_prog_free_deferred [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85800000 r8:85643cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 INFO: task kworker/0:443:6021 blocked for more than 476 seconds. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:857bd78c r4:857bd400 Exception stack(0xeca89fb0 to 0xeca89ff8) Exception stack(0xe0529d28 to 0xe0529d70) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a42200 r5:85806000 r4:8291892c [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85643e00 r4:8571bac0 Exception stack(0xe0529d28 to 0xe0529d70) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:6026 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecaadd84 r8:00000002 r7:60000013 r6:ecaadd8c r5:85803c00 r4:85803c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85803c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaade08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:eca95000 r10:61c88647 r9:85803c00 r8:85643eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82918930 r9:ecab9d84 r8:00000002 r7:60000113 r6:ecab9d8c r5:85805400 r5:00001000 r4:ecaa5000 r7:dddced80 r6:83018000 r5:857be38c r4:85643f00 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:6030 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:6030 tgid:6030 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecab5000 Exception stack(0xecacdfb0 to 0xecacdff8) Exception stack(0xe0529d28 to 0xe0529d70) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857bf38c r4:857bf000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85748340 INFO: task kworker/0:448:6032 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 98ceb000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748680 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a42200 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:ecaf5000 r4:85751100 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:6038 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:6038 tgid:6038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb0dd84 r8:00000002 r7:60000113 r6:ecb0dd8c r5:8580b000 r4:8580b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748bc0 r5:00001000 r4:ecb15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 9958c000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:6039 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:6039 tgid:6039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:85809800 r4:85809800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85809800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748a80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85809800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bfb8c r4:857bf800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85751200 9fa0: 00000000 00000000 00000000 00000000 r4:85748780 INFO: task kworker/0:452:6039 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 996b7000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:ecb31000 Exception stack(0xecb39fb0 to 0xecb39ff8) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:454 state:D stack:0 pid:6044 tgid:6044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:849a3000 r4:849a3000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a3000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85748cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:00001000 r4:ecb25000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9d20: 99d6d000 ee50b000 00000001 80239b98 7f7b5000 00000001 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82918930 r9:ecb45d84 r8:00000002 r7:60000113 r6:ecb45d8c r5:849a6c00 r5:00001000 r4:ecb55000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85748d80 INFO: task kworker/0:456:6048 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9a027000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82918930 r9:ec955d84 r8:00000002 r7:60000013 r6:ec955d8c r5:849a3c00 r5:00001000 r4:ecb4d000 r5:857c0f8c r4:857c0c00 5fa0: 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ecb61d84 r8:00000002 r7:60000013 r6:ecb61d8c r5:849a1800 r4:849a1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765900 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb75000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c1f8c r4:857c1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:84b0938c r4:84b09000 9fa0: 00000000 00000000 00000000 00000000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb5d000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c178c r4:857c1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c178c r4:85751800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0000 r8:8575182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85751800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765780 r7:dddced80 r6:83018000 r5:857c1b8c r4:85751900 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765c40 r5:00001000 r4:ecb8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c238c r4:857c2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c238c r4:85751a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:85751a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85751a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85751a00 r8:8027f5e8 r7:ecb61e60 r6:85751a80 r5:8476e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85765700 INFO: task kworker/0:461:6058 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9af69000 ee50b000 00000001 80239b98 7f7b5000 00000001 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 r10:61c88647 r9:85041800 r8:85751b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r5:00001000 r4:ecbad000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r7:ddde2d80 r6:83018200 r5:8578a78c r4:85758300 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecbb5fb0 to 0xecbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85765f00 INFO: task kworker/0:464:6066 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9b7b1000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:ecbc5000 r7:dddced80 r6:83018000 r5:857c338c r4:85751d80 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763780 r10:61c88647 r9:8580d400 r8:85751e2c r7:82804d40 r6:dddced80 r5:dddceda0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) Not tainted 6.15.0-syzkaller #0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763440 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8580bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c378c r4:857c3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c378c r4:85751e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580bc00 r8:85751eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85751e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85751e80 r8:8027f5e8 r7:ecbd9e60 r6:85758600 r5:8580bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbddfb0 to 0xecbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) Exception stack(0xe0529fb0 to 0xe0529ff8) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:ddde2d80 r6:83018200 r5:8578af8c r4:85758580 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:00000001 task:kworker/0:469 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85810c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0529dc0 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec91dd84 r8:00000002 r7:60000013 r6:ec91dd8c r5:85811800 r4:85811800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85811800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xec91dfb0 to 0xec91dff8) r4:00000000 r4:e0529dc0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8575d080 r8:8027f5e8 r7:ec91de60 r6:85758880 r5:85813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85763600 INFO: task kworker/0:471:6081 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9cb37000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 Exception stack(0xe0529fb0 to 0xe0529ff8) [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c8f8c r4:857c8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c8f8c r4:8575d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810000 r8:8575d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d180 r8:8027f5e8 r7:ec961e60 r6:85758980 r5:85810000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbedfb0 to 0xecbedff8) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a42200 INFO: task kworker/0:474:6087 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:6087 tgid:6087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbf1d84 r8:00000002 r7:60000013 r6:ecbf1d8c r5:85814800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85814800 r8:8575d22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:6090 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:6090 tgid:6090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec975d84 r8:00000002 r7:60000113 r6:ec975d8c r5:85815400 r4:85815400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85815400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec975e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e040 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85815400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3ed000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ca38c r4:857ca000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85815400 r8:8575d2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85763ac0 INFO: task kworker/0:475:6090 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9d8dc000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763140 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857c9b8c r4:857c9800 r10:61c88647 r9:85816000 r8:8575d32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1001:6095 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1001 state:D stack:0 pid:6095 tgid:6095 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85816c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec5d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:841f4f8c r4:841f4c00 r10:61c88647 r9:85816c00 r8:85758bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8576c580 INFO: task kworker/1:1001:6095 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9dca2000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:6097 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6097 tgid:6097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbfdd84 r8:00000002 r7:60000113 r6:ecbfdd8c r5:857fec00 r4:857fec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85765f40 r5:00001000 r4:ec3ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:857c9f8c r4:8575d380 Exception stack(0xecbfdfb0 to 0xecbfdff8) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6100 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc05d84 r8:00000002 r7:60000113 r6:ecc05d8c r5:85818c00 r4:85818c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85818c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e340 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec42b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ca78c r4:857ca400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ca78c r4:8575d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818c00 r8:8575d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d400 r8:8027f5e8 r7:ec975e60 r6:85758d00 r5:85818c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e100 INFO: task kworker/0:478:6100 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9e359000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) INFO: task kworker/0:479:6101 blocked for more than 478 seconds. r4:85819800 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85819800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857cb38c r4:857cb000 r10:61c88647 r9:85819800 r8:8575d4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1002:6103 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1002 state:D stack:0 pid:6103 tgid:6103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc01d84 r8:00000002 r7:60000113 r6:ecc01d8c r5:8581a400 r4:8581a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc01e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585b100 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec44d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578b78c r4:8578b400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578b78c r4:85758e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581a400 r8:85758e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85758e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758e00 r8:8027f5e8 r7:ecbc9e60 r6:85758e80 r5:8581a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc01fb0 to 0xecc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585b040 INFO: task kworker/1:1002:6103 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9f1be000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:6104 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec489000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857cab8c r4:857ca800 r10:61c88647 r9:8581b000 r8:8575d52c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1003:6107 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1003 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc11d84 r8:00000002 r7:60000113 r6:ecc11d8c r5:8581bc00 r4:8581bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585b640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bf8c r4:8578bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8578bf8c r4:85758f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581bc00 r8:85758fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85758f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758f80 r8:8027f5e8 r7:ecbc9e60 r6:8576e000 r5:8581bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8585b1c0 INFO: task kworker/1:1003:6107 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9f1be000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:6108 tgid:6108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc15d84 r8:00000002 r7:60000113 r6:ecc15d8c r5:8581c800 r4:8581c800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581c800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc15e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e600 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8581c800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857caf8c r4:857cac00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8581c800 r8:8575d5ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e840 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8581d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cb78c r4:857cb400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cb78c r4:8575d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581d400 r8:8575d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d600 r8:8027f5e8 r7:ecc09e60 r6:8576e100 r5:8581d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e540 INFO: task kworker/0:482:6112 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: 9f79c000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e0529dc0 r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:483 state:D stack:0 pid:6113 tgid:6113 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ec549000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cbb8c r4:857cb800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cbb8c r4:8575d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818000 r8:8575d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d680 r8:8027f5e8 r7:ecc25e60 r6:8576e180 r5:85818000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc29fb0 to 0xecc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e540 INFO: task kworker/0:483:6113 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a0357000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6115 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc31d84 r8:00000002 r7:60000113 r6:ecc31d8c r5:8581ec00 r4:8581ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8581ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ed80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8581ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cc78c r4:857cc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cc78c r4:8575d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581ec00 r8:8575d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d700 r8:8027f5e8 r7:ecc29e60 r6:8576e200 r5:8581ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:6116 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:6116 tgid:6116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbf9d84 r8:00000002 r7:60000013 r6:ecbf9d8c r5:85043000 r4:85043000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85043000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r9:83018005 r8:85043000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:00001000 r4:ec577000 r5:857cbf8c r4:857cbc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85043000 r8:8575d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d780 r8:8027f5e8 r7:ecc31e60 r6:8575d800 r5:85043000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575e880 INFO: task kworker/0:485:6116 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:6120 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:85044800 r4:85044800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85044800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ec80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85044800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec595000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:857cc38c r4:8575d880 Exception stack(0xecc2dfb0 to 0xecc2dff8) r4:8575eb80 Call trace: 9d20: a0978000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r5:00001000 r4:e03bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:6121 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc39d84 r8:00000002 r7:60000013 r6:ecc39d8c r5:85045400 r4:85045400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85045400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575ef40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ccb8c r4:857cc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ccb8c r4:8575d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85045400 r8:8575d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575d980 r8:8027f5e8 r7:ecc31e60 r6:8575da00 r5:85045400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575ec00 INFO: task kworker/0:487:6121 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1272000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868380 r5:00001000 r4:ec8bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85046000 r8:8575daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575da80 r8:8027f5e8 r7:ecc39e60 r6:8575db00 r5:85046000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc3dfb0 to 0xecc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8575edc0 INFO: task kworker/0:488:6123 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1272000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85046c00 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e280 r5:00001000 r4:ec6c1000 r10:61c88647 r9:85046c00 r8:8575dbac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0529dc0 r5:84b0938c r4:84b09000 r4:00000001 INFO: task kworker/0:490:6126 blocked for more than 478 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r5:00001000 r4:ec85b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cd38c r4:857cd000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cd38c r4:8575dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85040c00 r8:8575dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575dc80 r8:8027f5e8 r7:ecc3de60 r6:8575dd00 r5:85040c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868080 INFO: task kworker/0:490:6126 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1272000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8d3000 r7:dddced80 r6:83018000 r5:857cdb8c r4:8575dd80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec913000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85040000 r8:8575deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8575de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575de80 r8:8027f5e8 r7:ecc45e60 r6:8575df00 r5:85040000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc4dfb0 to 0xecc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868580 INFO: task kworker/0:492:6131 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a1f7e000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec8f5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85868300 Exception stack(0xe0529d28 to 0xe0529d70) r4:00000000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:857ce78c r4:857ce400 r10:00000000 r9:8586f080 r8:8027f5e8 r7:ecc4de60 r6:8586f100 r5:85030000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:6137 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc59d84 r8:00000002 r7:60000113 r6:ecc59d8c r5:85030c00 r4:85030c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85030c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868b00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ceb8c r4:857ce800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ceb8c r4:8586f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85030c00 r8:8586f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f180 r8:8027f5e8 r7:ecc55e60 r6:8586f200 r5:85030c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc59fb0 to 0xecc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868740 INFO: task kworker/0:495:6137 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a282f000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:6139 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec751d84 r8:00000002 r7:60000113 r6:ec751d8c r5:85031800 r4:85031800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018005 r8:85031800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:eb015000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:6141 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:6141 tgid:6141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7b1d84 r8:00000002 r7:60000013 r6:ec7b1d8c r5:85032400 r4:85032400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85032400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85868740 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85032400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb253000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cf38c r4:857cf000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cf38c r4:8586f380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85032400 r8:8586f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586f380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f380 r8:8027f5e8 r7:ec751e60 r6:8586f400 r5:85032400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b1fb0 to 0xec7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85868740 INFO: task kworker/0:497:6141 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 9d20: a3532000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 9fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3b3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857cf78c r4:8586f480 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85034800 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb77b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a3dc7000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:6148 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:6148 tgid:6148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:85033000 r4:85033000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85033000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:857d838c r4:8586f680 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:6149 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec815d84 r8:00000002 r7:60000013 r6:ec815d8c r5:85035400 r4:85035400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85035400 r4:8291892c r4:00000000 r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb7e5000 r7:dddced80 r6:83018000 r5:857cff8c r4:8586f780 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84b0938c r4:84b09000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:849b0000 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec7c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858d438c r4:8576e280 r10:00000000 r9:8576e280 r8:8027f5e8 r7:ecbc9e60 r6:8586f880 r5:849b0000 r4:84a193c0 Call trace: 9d20: a4353000 ee50b000 00000001 80239b98 7f7b5000 00000001 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85898000 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec755000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:841f538c r4:8576e300 r10:00000000 r9:8576e300 r8:8027f5e8 r7:eca31e60 r6:8576e380 r5:85898000 r4:84a193c0 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a4a19000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:6156 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca2dd84 r8:00000002 r7:60000013 r6:eca2dd8c r5:849b1800 r4:849b1800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b1800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca2de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877a00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec681000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d878c r4:857d8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d878c r4:8586f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:8586f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586f900 r8:8027f5e8 r7:ec9c9e60 r6:8586f980 r5:849b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858776c0 INFO: task kworker/0:502:6156 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80090013 r4:80239bb0 r4:e0529dc0 r5:00001000 r4:e03bf000 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:84a42200 Workqueue: events bpf_prog_free_deferred r5:849b3c00 r4:8291892c [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec805000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857d8b8c r4:8586fa00 r10:00000000 r9:8586fa00 r8:8027f5e8 r7:eca2de60 r6:8586fa80 r5:849b3c00 r4:85877880 Call trace: 9d20: a4a19000 ee50b000 00000001 80239b98 7f7b5000 00000001 r4:e0529dc0 r5:00001000 r4:e03bf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877000 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d8f8c r4:857d8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d8f8c r4:8586fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:8586fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586fb00 r8:8027f5e8 r7:eca7de60 r6:8586fb80 r5:849b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85877900 INFO: task kworker/0:504:6161 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a4fa0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecabde08 r5:00001000 r4:ecd3b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1007:6164 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1007 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eca3f000 r10:61c88647 r9:849b6000 r8:8576e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84b0938c r4:84b09000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 INFO: task kworker/0:505:6166 blocked for more than 478 seconds. r10:82918930 r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:849b4800 r4:00000000 r5:00001000 r4:ec84d000 r10:61c88647 r9:849b4800 r8:8586fd2c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85877f00 INFO: task kworker/0:505:6166 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a5ed4000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:6168 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec965000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8586fe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Not tainted 6.15.0-syzkaller #0 r4:849b6c00 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec983000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:507:6172 is blocked on a mutex likely owned by task kworker/0:76:3655. 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:00000000 r5:84b0938c r4:84b09000 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Not tainted 6.15.0-syzkaller #0 r5:849b3000 r4:8291892c [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586d640 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec997000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d9f8c r4:857d9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d9f8c r4:85871000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3000 r8:8587102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871000 r8:8027f5e8 r7:ecab1e60 r6:85871080 r5:849b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca5dfb0 to 0xeca5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d380 INFO: task kworker/0:508:6173 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a6ca6000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:509:6174 blocked for more than 478 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d9e08 r5:00001000 r4:ec9b5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8586d380 INFO: task kworker/0:509:6174 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a6f41000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r5:00001000 r4:ec9e5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:510:6177 is blocked on a mutex likely owned by task kworker/0:76:3655. r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a6f41000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:6178 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 r5:85830000 r4:8291892c [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec9c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857da78c r4:85871300 Exception stack(0xecb11fb0 to 0xecb11ff8) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80090013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0529fb0 to 0xe0529ff8) Workqueue: events bpf_prog_free_deferred [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586db40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9db000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dab8c r4:857da800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dab8c r4:85871400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830c00 r8:8587142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871400 r8:8027f5e8 r7:ecaf1e60 r6:85871480 r5:85830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d9c0 INFO: task kworker/0:512:6181 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a7cbc000 ee50b000 00000001 80239b98 7f7b5000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85831800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 r5:00001000 r4:ec9fb000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecbe5fb0 to 0xecbe5ff8) INFO: task kworker/0:513:6182 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a80d0000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a42200 r4:85832400 [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca49000 r7:dddced80 r6:83018000 r5:857e478c r4:85871600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0529fb0 to 0xe0529ff8) Not tainted 6.15.0-syzkaller #0 r4:85833000 r4:00000000 r5:00001000 r4:eca05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:6187 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:85833c00 r4:85833c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85833c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877b80 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dbb8c r4:857db800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbb8c r4:85871800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833c00 r8:8587182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871800 r8:8027f5e8 r7:ecbe9e60 r6:85871880 r5:85833c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:516:6187 is blocked on a mutex likely owned by task kworker/0:76:3655. r4:82ac11e4 r5:00001000 r4:e03bf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca23000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dbf8c r4:857dbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbf8c r4:85871900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85835400 r8:8587192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871900 r8:8027f5e8 r7:ecbe9e60 r6:85871980 r5:85835400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc61fb0 to 0xecc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 Workqueue: events bpf_prog_free_deferred r4:85836000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85836000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc6de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587cf40 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85836000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d478c r4:858d4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d478c r4:8576e500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836000 r8:8576e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r4:84a4a480 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ecc69d84 r8:00000002 r7:60000013 r6:ecc69d8c r5:85836c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85885640 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e4b8c r4:85871b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836c00 r8:85871b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871b00 r8:8027f5e8 r7:ecbe9e60 r6:85871b80 r5:85836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85885580 INFO: task kworker/0:518:6194 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: a996a000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:519:6196 blocked for more than 479 seconds. [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eca69000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r5:00001000 r4:e03bf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:520 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:85838000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:520:6198 is blocked on a mutex likely owned by task kworker/0:76:3655. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:6200 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:6200 tgid:6200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc81d84 r8:00000002 r7:60000013 r6:ecc81d8c r5:8589bc00 r4:8589bc00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8589bc00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eca97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857e578c r4:85871e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0529d28 to 0xe0529d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a42200 r4:8589c800 r4:00000000 r5:00001000 r4:ecaa3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc89fb0 to 0xecc89ff8) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 Exception stack(0xe0529d28 to 0xe0529d70) 9d20: aa6ac000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:6204 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:6204 tgid:6204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc91d84 r8:00000002 r7:60000013 r6:ecc91d8c r5:8589a400 r4:8589a400 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8589a400 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc91e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767340 r5:00001000 r4:e473b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:523:6204 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8589d400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r5:00001000 r4:ecabf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:524:6205 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:525 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc9dd84 r8:00000002 r7:60000113 r6:ecc9dd8c r5:8589ec00 r4:8589ec00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8589ec00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85885f00 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8589ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e638c r4:857e6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e638c r4:85871a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589ec00 r8:85871a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85871a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871a00 r8:8027f5e8 r7:ecc91e60 r6:8576e780 r5:8589ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85885b40 INFO: task kworker/0:525:6207 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ab1ba000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r5:80090013 r4:80239bb0 r5:00001000 r4:e03bf000 r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6209 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6209 tgid:6209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc79d84 r8:00000002 r7:60000113 r6:ecc79d8c r5:85838c00 r4:85838c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85838c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858851c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85838c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85838c00 r8:8589302c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:1009:6211 blocked for more than 479 seconds. r4:8583a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r5:00001000 r4:eb8d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:527 state:D stack:0 pid:6213 tgid:6213 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8589e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857671c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8589e000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e6b8c r4:857e6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e6b8c r4:85893100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589e000 r8:8589312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893100 r8:8027f5e8 r7:ecc91e60 r6:8576e880 r5:8589e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca1fb0 to 0xecca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85885cc0 INFO: task kworker/0:527:6213 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: abbfb000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85899800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767480 r5:00001000 r4:eaf43000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:857e738c r4:85893200 r4:85893200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893200 r8:8027f5e8 r7:ecc91e60 r6:8576e900 r5:85899800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767100 INFO: task kworker/0:528:6216 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac038000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:6218 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r5:85898c00 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:eb15f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e778c r4:857e7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e778c r4:85893300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85898c00 r8:8589332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893300 r8:8027f5e8 r7:ec8fde60 r6:8576e980 r5:85898c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc19fb0 to 0xecc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767300 INFO: task kworker/0:529:6218 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac20a000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8589b000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 r5:00001000 r4:eb925000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85893280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893280 r8:8027f5e8 r7:ecc19e60 r6:8576ea00 r5:8589b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767380 INFO: task kworker/0:530:6220 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac6ad000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767800 r5:00001000 r4:eb995000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85767780 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: ac6ad000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:6223 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccb5d84 r8:00000002 r7:60000013 r6:eccb5d8c r5:84990c00 r4:84990c00 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84990c00 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec331000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84990c00 r8:8589342c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeccb5fb0 to 0xeccb5ff8) r4:85767700 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0529d28 to 0xe0529d70) [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a4a480 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6225 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6225 tgid:6225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc7dd84 r8:00000002 r7:60000113 r6:ecc7dd8c r5:85839800 r4:85839800 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85839800 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc7de08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767980 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85839800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:00001000 r4:eba09000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc7dfb0 to 0xecc7dff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:e03bf000 r4:84a4a480 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ebad5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:534:6227 is blocked on a mutex likely owned by task kworker/0:76:3655. Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:6229 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccc1d84 r8:00000002 r7:60000113 r6:eccc1d8c r5:8583e000 r4:8583e000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8583e000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8583e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec405000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590cf8c r4:8590cc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590cf8c r4:85893680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583e000 r8:858936ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893680 r8:8027f5e8 r7:eccb5e60 r6:85893700 r5:8583e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80230ad4 80239bb0 80090013 ffffffff r4:e0529dc0 r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:536 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec43b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85767e40 INFO: task kworker/0:536:6233 is blocked on a mutex likely owned by task kworker/0:76:3655. task:kworker/0:76 state:R running task stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a63b10>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r4:00000000 [<81a63ad0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0529d28 to 0xe0529d70) 9d20: acf65000 ee50b000 00000001 80239b98 7f7b5000 00000001 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 9d60: 80230ad4 80239bb0 80090013 ffffffff r5:80090013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r4:e0529dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a4d400 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:8583ec00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594c040 r5:00001000 r4:ec47f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8594c080 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 Exception stack(0xe0529fb0 to 0xe0529ff8) Workqueue: events bpf_prog_free_deferred r5:8583bc00 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:ec4bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8594c240 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:6239 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecccdd84 r8:00000002 r7:60000113 r6:ecccdd8c r5:8583b000 r4:8583b000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8583b000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecccde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594c4c0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8583b000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4e3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590df8c r4:8590dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590df8c r4:85893a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583b000 r8:85893aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893a80 r8:8027f5e8 r7:eccc9e60 r6:85893b00 r5:8583b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecccdfb0 to 0xecccdff8) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84ab8000 r8:80200be4 r7:e0529d5c r6:ffffffff r5:84ab8000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd1e08 r5:00001000 r4:ec52f000 r10:61c88647 r9:85850000 r8:85893bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8594c340 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0529d28 to 0xe0529d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0529dc0 r5:e0529e08 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:6243 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:6243 tgid:6243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccd9d84 r8:00000002 r7:60000113 r6:eccd9d8c r5:84993000 r4:84993000 [<81a636b0>] (schedule) from [<81a63ac4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84993000 r4:8291892c [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63aac>] (schedule_preempt_disabled) from [<81a661a8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd9e08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594cbc0 r4:00000000 [<804e7c00>] (vfree) from [<80547674>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84993000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590f38c r4:8590f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8590f38c r4:85893c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84993000 r8:85893cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85893c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85893c80 r8:8027f5e8 r7:eccd1e60 r6:8576eb80 r5:84993000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d40: 82ac05a0 7f7b5000 ee50b000 8280c930 82ac11c4 e0529da4 e0529da8 e0529d78 r4:00000000 r5:00001000 r4:e03bf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b0938c r4:84b09000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b0938c r4:84a4a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8000 r8:84a4a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a4a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4a480 r8:8027f5e8 r7:dff39e60 r6:84a53700 r5:84ab8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a42200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:6244 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62754>] (__schedule) from [<81a636dc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62754>] (__schedule) from [<81a636dc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccddd84 r8:00000002 r7:60000113 r6:eccddd8c r5:84993c00 [<81a65ea8>] (__mutex_lock.constprop.0) from [<81a66674>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a66660>] (__mutex_lock_slowpath) from [<81a666b4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66678>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8594c500 r4:00000000 r4:82ac11e4 [<80547644>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a4a480