Extracting prog: 11m14.605053667s Minimizing prog: 4h17m45.637431103s Simplifying prog options: 0s Extracting C: 8m36.885861614s Simplifying C: 58m45.385892198s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_migrate_task\x00', r1}, 0x18) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_migrate_task\x00', r1}, 0x18) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 5 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$MAP_CREATE-bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 5h36m22.514268551s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a63b8c r4:85a63800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a63b8c r4:830cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027f5e8 r7:df819d50 r6:830cd100 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bd9c8000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:2:44 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:44 tgid:44 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df915d84 r8:00000002 r7:60000113 r6:df915d8c r5:83813000 r4:83813000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83813000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df915e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83813000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a62b8c r4:85a62800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a62b8c r4:832d8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83813000 r8:832d8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832d8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d8d80 r8:8027f5e8 r7:df911e60 r6:83328c00 r5:83813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf915fb0 to 0xdf915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832d7b00 INFO: task kworker/1:2:44 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: be86d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:2:725 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:725 tgid:725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:83ada400 r4:83ada400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ada400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b24440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ada400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85127b8c r4:85127800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85127b8c r4:83362e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ada400 r8:83362eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83362e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83362e80 r8:8027f5e8 r7:df83de60 r6:83362f00 r5:83ada400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83363c80 INFO: task kworker/0:2:725 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: be86d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:1:3090 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3090 tgid:3090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:842e2400 r4:842e2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842e2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a61b8c r4:85a61800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a61b8c r4:848d2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842e2400 r8:848d21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d2180 r8:8027f5e8 r7:df915e60 r6:848d2500 r5:842e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84930680 INFO: task kworker/1:1:3090 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bef43000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:3:3109 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3109 tgid:3109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df969d84 r8:00000002 r7:60000113 r6:df969d8c r5:838e5400 r4:838e5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838e5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df969e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6338c r4:85a63000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6338c r4:848d2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838e5400 r8:848d2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d2a80 r8:8027f5e8 r7:df915e60 r6:848d2480 r5:838e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf969fb0 to 0xdf969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8469ff80 INFO: task kworker/1:3:3109 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bf5f7000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:4:3118 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83243c00 r4:83243c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83243c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497cf8c r4:8497cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497cf8c r4:84942500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83243c00 r8:8494252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942500 r8:8027f5e8 r7:eb039e60 r6:84942280 r5:83243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d7440 INFO: task kworker/0:4:3118 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0659000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:6:3124 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:83238c00 r4:83238c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490c340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0504000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500838c r4:85008000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8500838c r4:84942680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238c00 r8:849426ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942680 r8:8027f5e8 r7:df9dde60 r6:84942780 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d7840 INFO: task kworker/0:6:3124 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0659000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:9:3132 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:8444b000 r4:8444b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8444b000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4f8c r4:852a4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a4f8c r4:83328680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444b000 r8:833286ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328680 r8:8027f5e8 r7:df941e60 r6:84942900 r5:8444b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443a640 INFO: task kworker/1:9:3132 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0659000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:7:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8444e000 r4:8444e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490c0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444e000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85008b8c r4:85008800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85008b8c r4:84942a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444e000 r8:84942a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942a00 r8:8027f5e8 r7:df9dde60 r6:84942b00 r5:8444e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d7f80 INFO: task kworker/0:7:3137 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c13ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:8:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df995d84 r8:00000002 r7:60000113 r6:df995d8c r5:8444d400 r4:8444d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df995e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84929ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b89b8c r4:84b89800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b89b8c r4:84942a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444d400 r8:84942aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942a80 r8:8027f5e8 r7:df9dde60 r6:84942c00 r5:8444d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf995fb0 to 0xdf995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d75c0 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c13ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:8444c800 r4:8444c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fbb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8a78c r4:84b8a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b8a78c r4:84942b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444c800 r8:84942bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942b80 r8:8027f5e8 r7:df9dde60 r6:84942c80 r5:8444c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b6e00 INFO: task kworker/0:9:3141 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c196d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:8444bc00 r4:8444bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512778c r4:85127400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512778c r4:84942d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444bc00 r8:84942d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942d00 r8:8027f5e8 r7:df9dde60 r6:84942d80 r5:8444bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f040 INFO: task kworker/0:10:3143 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c196d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:84448c00 r4:84448c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84448c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c2f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501e38c r4:8501e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501e38c r4:83328a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84448c00 r8:83328a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328a00 r8:8027f5e8 r7:dfa3de60 r6:84942e00 r5:84448c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443ac40 INFO: task kworker/1:11:3144 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c1e61000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3147 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:84359800 r4:84359800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84359800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84359800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a7b8c r4:852a7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a7b8c r4:83328b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84359800 r8:83328bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328b80 r8:8027f5e8 r7:dfa3de60 r6:84942e80 r5:84359800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443ae00 INFO: task kworker/1:12:3147 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c1e61000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:8435a400 r4:8435a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84826740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4949000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497c78c r4:8497c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497c78c r4:84942f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435a400 r8:84942f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942f00 r8:8027f5e8 r7:df9dde60 r6:84942f80 r5:8435a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f3c0 INFO: task kworker/0:11:3158 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2207000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3159 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83ac2400 r4:83ac2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84811240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac2400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509a38c r4:8509a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509a38c r4:83328e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac2400 r8:83328eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328e80 r8:8027f5e8 r7:dfa3de60 r6:838a2a80 r5:83ac2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a740 INFO: task kworker/1:13:3159 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2207000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:83ac1800 r4:83ac1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7b200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac1800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509b38c r4:8509b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509b38c r4:830cd280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:830cd2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027f5e8 r7:dfa3de60 r6:8426ed00 r5:83ac1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a740 INFO: task kworker/1:14:3160 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2207000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3161 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:83ac0c00 r4:83ac0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509bf8c r4:8509bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509bf8c r4:8426ec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac0c00 r8:8426ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8426ec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8426ec80 r8:8027f5e8 r7:dfadde60 r6:8426e900 r5:83ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a740 INFO: task kworker/1:15:3161 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2509000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83ae6000 r4:83ae6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ab80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fdb8c r4:851fd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fdb8c r4:8426e880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae6000 r8:8426e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8426e880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8426e880 r8:8027f5e8 r7:dfae1e60 r6:84280f80 r5:83ae6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a200 INFO: task kworker/1:16:3162 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2774000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3163 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:8382d400 r4:8382d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8382d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ced40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8382d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a69f8c r4:85a69c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a69f8c r4:84941000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8382d400 r8:8494102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941000 r8:8027f5e8 r7:dfae5e60 r6:84941080 r5:8382d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a300 INFO: task kworker/1:17:3163 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2774000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3164 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83908c00 r4:83908c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83908c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c1c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fff8c r4:851ffc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fff8c r4:84941100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83908c00 r8:8494112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941100 r8:8027f5e8 r7:dfae9e60 r6:84941180 r5:83908c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a6c0 INFO: task kworker/1:18:3164 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2e00000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83ad4800 r4:83ad4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cd800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547eb8c r4:8547e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547eb8c r4:84941200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad4800 r8:8494122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941200 r8:8027f5e8 r7:dfae9e60 r6:84941280 r5:83ad4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a780 INFO: task kworker/1:19:3165 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3505000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83ad3000 r4:83ad3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5ff8c r4:85a5fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5ff8c r4:84941300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad3000 r8:8494132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941300 r8:8027f5e8 r7:dfae9e60 r6:84941380 r5:83ad3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499aa00 INFO: task kworker/1:20:3166 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3505000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:8435ec00 r4:8435ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848268c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0683000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85363b8c r4:85363800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85363b8c r4:84942200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435ec00 r8:8494222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942200 r8:8027f5e8 r7:df9dde60 r6:8387c600 r5:8435ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f300 INFO: task kworker/0:12:3168 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3505000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:8435b000 r4:8435b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855340c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb755000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eb38c r4:855eb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eb38c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435b000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:df9dde60 r6:830b8700 r5:8435b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f8c0 INFO: task kworker/0:13:3170 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3b91000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:84358c00 r4:84358c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84358c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577dac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84358c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb157000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572038c r4:85720000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572038c r4:830b8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84358c00 r8:830b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027f5e8 r7:dfafde60 r6:830b8600 r5:84358c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f940 INFO: task kworker/0:14:3172 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3b91000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:8435bc00 r4:8435bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497d38c r4:8497d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497d38c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435bc00 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:dfb09e60 r6:830b8500 r5:8435bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fac0 INFO: task kworker/0:15:3174 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3b91000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:8435e000 r4:8435e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566de00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497d78c r4:8497d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497d78c r4:8387c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435e000 r8:8387c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8387c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8387c680 r8:8027f5e8 r7:dfb09e60 r6:832c5180 r5:8435e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fc40 INFO: task kworker/0:16:3177 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c44ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:84358000 r4:84358000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84358000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84358000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85348b8c r4:85348800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85348b8c r4:832c5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84358000 r8:832c562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832c5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832c5600 r8:8027f5e8 r7:dfb09e60 r6:84551b80 r5:84358000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fe00 INFO: task kworker/0:17:3179 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c44ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:8435c800 r4:8435c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589e040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534938c r4:85349000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534938c r4:84921e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435c800 r8:84921eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84921e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921e80 r8:8027f5e8 r7:dfb09e60 r6:84921f80 r5:8435c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499ff00 INFO: task kworker/0:18:3181 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4826000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:84196000 r4:84196000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84196000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84196000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec609000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534a38c r4:8534a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534a38c r4:84921780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84196000 r8:849217ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84921780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921780 r8:8027f5e8 r7:dfb39e60 r6:84921e00 r5:84196000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499ff00 INFO: task kworker/0:19:3182 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4d00000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83a18000 r4:83a18000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a18000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bdbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a18000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534878c r4:85348400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534878c r4:84921d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a18000 r8:84921dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84921d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921d80 r8:8027f5e8 r7:dfa7de60 r6:84921f00 r5:83a18000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916240 INFO: task kworker/0:20:3185 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4fc2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:83a1e000 r4:83a1e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85349b8c r4:85349800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85349b8c r4:84913100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a1e000 r8:8491312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913100 r8:8027f5e8 r7:dfa7de60 r6:84913080 r5:83a1e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916100 INFO: task kworker/0:21:3187 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4fc2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:83a1a400 r4:83a1a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580cf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c838c r4:858c8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c838c r4:84913000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a1a400 r8:8491302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913000 r8:8027f5e8 r7:dfa7de60 r6:84913200 r5:83a1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916440 INFO: task kworker/0:22:3189 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:83a18c00 r4:83a18c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a18c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad08c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534bf8c r4:8534bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534bf8c r4:84913180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a18c00 r8:849131ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913180 r8:8027f5e8 r7:dfa7de60 r6:84913300 r5:83a18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849165c0 INFO: task kworker/0:23:3191 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:83adb000 r4:83adb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac5140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83adb000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534ab8c r4:8534a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534ab8c r4:84913280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adb000 r8:849132ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913280 r8:8027f5e8 r7:dfb81e60 r6:84913380 r5:83adb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849165c0 INFO: task kworker/0:24:3192 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83add400 r4:83add400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83add400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83add400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb993000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497ff8c r4:8497fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497ff8c r4:84913400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83add400 r8:8491342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913400 r8:8027f5e8 r7:dfb81e60 r6:84913500 r5:83add400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916800 INFO: task kworker/0:25:3194 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83adec00 r4:83adec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83adec00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497eb8c r4:8497e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497eb8c r4:84913480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:849134ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913480 r8:8027f5e8 r7:dfb8de60 r6:84913600 r5:83adec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916980 INFO: task kworker/0:26:3196 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83ade000 r4:83ade000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ade000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fcc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ade000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497e78c r4:8497e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497e78c r4:84913580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ade000 r8:849135ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913580 r8:8027f5e8 r7:dfb8de60 r6:84913700 r5:83ade000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916b00 INFO: task kworker/0:27:3198 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83ad8000 r4:83ad8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846a7100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad8000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec55f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473d38c r4:8473d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473d38c r4:84913680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:849136ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913680 r8:8027f5e8 r7:dfba5e60 r6:84913800 r5:83ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916e00 INFO: task kworker/0:28:3200 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:83ad8c00 r4:83ad8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497df8c r4:8497dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497df8c r4:84913780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8c00 r8:849137ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913780 r8:8027f5e8 r7:dfbb1e60 r6:84913900 r5:83ad8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916ec0 INFO: task kworker/0:29:3202 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:83236000 r4:83236000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85637fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec527000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473c78c r4:8473c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473c78c r4:84913880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:849138ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913880 r8:8027f5e8 r7:dfbb1e60 r6:84913a00 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443a7c0 INFO: task kworker/0:30:3204 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df985d84 r8:00000002 r7:60000113 r6:df985d8c r5:83236c00 r4:83236c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df985e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857719c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f147000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473e38c r4:8473e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473e38c r4:84913b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236c00 r8:84913b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913b00 r8:8027f5e8 r7:dfbc9e60 r6:84913a80 r5:83236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf985fb0 to 0xdf985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7080 INFO: task kworker/0:31:3206 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c6be0000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83252400 r4:83252400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83252400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566e000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec517000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473db8c r4:8473d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473db8c r4:84913b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83252400 r8:84913bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913b80 r8:8027f5e8 r7:df985e60 r6:84913c80 r5:83252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7440 INFO: task kworker/0:32:3208 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c700f000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:842c6000 r4:842c6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566eb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473c38c r4:8473c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473c38c r4:84913c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c6000 r8:84913c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913c00 r8:8027f5e8 r7:df985e60 r6:84913d80 r5:842c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7080 INFO: task kworker/0:33:3210 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c72ce000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:842c0000 r4:842c0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:875305c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3db8c r4:85c3d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3db8c r4:84913d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c0000 r8:84913d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913d00 r8:8027f5e8 r7:df985e60 r6:84913e80 r5:842c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7440 INFO: task kworker/0:34:3212 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c72ce000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:842c3c00 r4:842c3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87530c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3d78c r4:85c3d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3d78c r4:84913e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c3c00 r8:84913e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913e00 r8:8027f5e8 r7:dfa21e60 r6:84913f80 r5:842c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7380 INFO: task kworker/0:35:3214 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c777b000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:842c1800 r4:842c1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af1940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473f38c r4:8473f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473f38c r4:846b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c1800 r8:846b102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1000 r8:8027f5e8 r7:dfa21e60 r6:846b1100 r5:842c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7a80 INFO: task kworker/0:36:3216 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c7c05000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:842c0c00 r4:842c0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564a040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3e78c r4:85c3e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3e78c r4:846b1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c0c00 r8:846b122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1200 r8:8027f5e8 r7:dfa39e60 r6:846b1080 r5:842c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a79c0 INFO: task kworker/0:37:3218 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c80df000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3220 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:842c4800 r4:842c4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564afc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3f78c r4:85c3f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3f78c r4:846b1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c4800 r8:846b11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1180 r8:8027f5e8 r7:dfa39e60 r6:846b1300 r5:842c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7a80 INFO: task kworker/0:38:3220 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c80df000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83812400 r4:83812400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83812400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83812400 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473eb8c r4:8473e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473eb8c r4:846b1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83812400 r8:846b12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1280 r8:8027f5e8 r7:dfa39e60 r6:846b1400 r5:83812400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7dc0 INFO: task kworker/0:39:3222 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c865c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3224 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83810000 r4:83810000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83810000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8579b840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83810000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588278c r4:85882400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8588278c r4:846b1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83810000 r8:846b13ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1380 r8:8027f5e8 r7:dfa6de60 r6:846b1500 r5:83810000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7e80 INFO: task kworker/0:40:3224 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c8cf9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83a13c00 r4:83a13c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a13c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c23c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f373000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed573000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee038c r4:87ee0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee038c r4:846b1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a13c00 r8:846b14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1480 r8:8027f5e8 r7:dfa6de60 r6:846b1600 r5:83a13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7c40 INFO: task kworker/0:41:3226 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c8cf9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3229 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83a12400 r4:83a12400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a12400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a12400 r7:00000000 r6:83018000 r5:00001000 r4:7f323000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473fb8c r4:8473f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473fb8c r4:846b1580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a12400 r8:846b15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1580 r8:8027f5e8 r7:dfbcde60 r6:846b1680 r5:83a12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be080 INFO: task kworker/0:42:3229 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c91a5000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:83a16000 r4:83a16000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a16000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b19c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a16000 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8874ef8c r4:8874ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8874ef8c r4:846b1700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a16000 r8:846b172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1700 r8:8027f5e8 r7:dfbcde60 r6:846b1800 r5:83a16000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be1c0 INFO: task kworker/0:43:3231 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c93eb000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:83a16c00 r4:83a16c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a16c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c0fd840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f395000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ace278c r4:8ace2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8ace278c r4:846b1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a16c00 r8:846b17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1780 r8:8027f5e8 r7:dfbcde60 r6:846b1900 r5:83a16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be440 INFO: task kworker/0:44:3233 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9a35000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:83a13000 r4:83a13000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a13000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a13000 r7:00000000 r6:83018000 r5:00001000 r4:7f381000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed395000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee178c r4:87ee1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee178c r4:846b1880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a13000 r8:846b18ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1880 r8:8027f5e8 r7:dfbfde60 r6:846b1980 r5:83a13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be440 INFO: task kworker/0:45:3234 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9a35000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3237 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:838f2400 r4:838f2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cfec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f3d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee3b8c r4:87ee3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee3b8c r4:846b1a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f2400 r8:846b1a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1a00 r8:8027f5e8 r7:dfbfde60 r6:846b1a80 r5:838f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be940 INFO: task kworker/0:46:3237 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9c83000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3238 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:838f0000 r4:838f0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846cbfc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f435000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed46d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eec38c r4:87eec000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eec38c r4:846b1b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f0000 r8:846b1b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1b00 r8:8027f5e8 r7:dfc09e60 r6:846b1c00 r5:838f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be440 INFO: task kworker/0:47:3238 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ca3c0000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:838f0c00 r4:838f0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552ad80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f431000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581b78c r4:8581b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581b78c r4:846b1b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f0c00 r8:846b1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1b80 r8:8027f5e8 r7:dfc21e60 r6:846b1c80 r5:838f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be940 INFO: task kworker/0:48:3240 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ca3c0000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:838f3c00 r4:838f3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846cb700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f44b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed683000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bdb8c r4:849bd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bdb8c r4:846b1d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f3c00 r8:846b1d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1d00 r8:8027f5e8 r7:dfc21e60 r6:846b1d80 r5:838f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bedc0 INFO: task kworker/0:49:3243 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cac46000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3245 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:838f6000 r4:838f6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f51f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc51000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8d55bb8c r4:8d55b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8d55bb8c r4:846b1e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f6000 r8:846b1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1e00 r8:8027f5e8 r7:dfc21e60 r6:846b1f00 r5:838f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bef80 INFO: task kworker/0:50:3245 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cac46000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:838f5400 r4:838f5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f477000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed60f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eecb8c r4:87eec800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eecb8c r4:846b1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f5400 r8:846b1eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1e80 r8:8027f5e8 r7:dfc45e60 r6:846b1f80 r5:838f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7f80 INFO: task kworker/0:51:3247 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb1f9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84a88000 r4:84a88000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a88000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a88000 r7:00000000 r6:83018000 r5:00001000 r4:7f547000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eecf8c r4:87eecc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eecf8c r4:846d3100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88000 r8:846d312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3100 r8:8027f5e8 r7:dfc45e60 r6:846d3000 r5:84a88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5280 INFO: task kworker/0:52:3249 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb52c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc69d84 r8:00000002 r7:60000013 r6:dfc69d8c r5:84a88c00 r4:84a88c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a88c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d57c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed56b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bf38c r4:849bf000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bf38c r4:846d3080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88c00 r8:846d30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3080 r8:8027f5e8 r7:dfc5de60 r6:846d3200 r5:84a88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5380 INFO: task kworker/0:53:3251 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb52c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3252 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc81d84 r8:00000002 r7:60000013 r6:dfc81d8c r5:83826000 r4:83826000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83826000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90024740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83826000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc23000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef438c r4:87ef4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef438c r4:846d3180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83826000 r8:846d31ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3180 r8:8027f5e8 r7:dfc69e60 r6:84941400 r5:83826000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5380 INFO: task kworker/0:54:3252 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb52c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3254 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc89d84 r8:00000002 r7:60000013 r6:dfc89d8c r5:83820000 r4:83820000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83820000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90024380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83820000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849be38c r4:849be000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849be38c r4:846d3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83820000 r8:846d32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3280 r8:8027f5e8 r7:dfc69e60 r6:84941480 r5:83820000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5540 INFO: task kworker/0:55:3254 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cbf1c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3256 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:83823000 r4:83823000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83823000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:900240c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83823000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849be78c r4:849be400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849be78c r4:846d3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83823000 r8:846d33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3380 r8:8027f5e8 r7:dfc69e60 r6:84941500 r5:83823000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5800 INFO: task kworker/0:56:3256 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc27a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfca1d84 r8:00000002 r7:60000013 r6:dfca1d8c r5:83ad0000 r4:83ad0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad0000 r7:00000000 r6:83018000 r5:00001000 r4:7f5a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eef38c r4:87eef000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eef38c r4:846d3400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad0000 r8:846d342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3400 r8:8027f5e8 r7:dfc69e60 r6:84941580 r5:83ad0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5640 INFO: task kworker/0:57:3258 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc27a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3260 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb11d84 r8:00000002 r7:60000013 r6:dfb11d8c r5:83ac6c00 r4:83ac6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d5900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bf78c r4:849bf400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bf78c r4:846d3480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6c00 r8:846d34ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3480 r8:8027f5e8 r7:dfca1e60 r6:84941600 r5:83ac6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d58c0 INFO: task kworker/0:58:3260 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc27a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3262 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb41d84 r8:00000002 r7:60000013 r6:dfb41d8c r5:84a00000 r4:84a00000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a00000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00000 r7:00000000 r6:83018000 r5:00001000 r4:7f5a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edab3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bff8c r4:849bfc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bff8c r4:846d3300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00000 r8:846d332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3300 r8:8027f5e8 r7:dfca1e60 r6:84941680 r5:84a00000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5880 INFO: task kworker/0:59:3262 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc6e9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb71d84 r8:00000002 r7:60000013 r6:dfb71d8c r5:84a00c00 r4:84a00c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a00c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed98b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eefb8c r4:87eef800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eefb8c r4:846d3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00c00 r8:846d352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3500 r8:8027f5e8 r7:dfca1e60 r6:84941700 r5:84a00c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d58c0 INFO: task kworker/0:60:3264 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ccb68000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3266 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfca9d84 r8:00000002 r7:60000013 r6:dfca9d8c r5:84a01800 r4:84a01800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a01800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a01800 r7:00000000 r6:83018000 r5:00001000 r4:7f5a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eeeb8c r4:87eee800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eeeb8c r4:846d3600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a01800 r8:846d362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3600 r8:8027f5e8 r7:dfca1e60 r6:84941780 r5:84a01800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5c80 INFO: task kworker/0:61:3266 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ccb68000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3268 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:84a02400 r4:84a02400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a02400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a02400 r7:00000000 r6:83018000 r5:00001000 r4:7f5a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eee38c r4:87eee000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eee38c r4:846d3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a02400 r8:846d36ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3680 r8:8027f5e8 r7:dfca9e60 r6:84941800 r5:84a02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5c40 INFO: task kworker/0:62:3268 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200b <> rog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a52f8c r4:85a52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a52f8c r4:85532580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85958c00 r8:855325ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532580 r8:8027f5e8 r7:eca45e60 r6:85532780 r5:85958c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8553c980 INFO: task kworker/1:986:6124 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:8595e000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85a53b8c r4:85a53800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85532700 r8:8027f5e8 r7:eca45e60 r6:85532880 r5:8595e000 r4:8553c200 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:6128 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb8dd84 r8:00000002 r7:60000113 r6:ecb8dd8c r5:85aab000 r4:85aab000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aab000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553cd00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aab000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec521000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a53f8c r4:85a53c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a53f8c r4:85532800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aab000 r8:8553282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532800 r8:8027f5e8 r7:eca45e60 r6:85526180 r5:85aab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8553cc40 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:8595bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r5:85a5878c r4:85a58400 r10:00000000 r9:85532980 r8:8027f5e8 r7:eca45e60 r6:85532900 r5:8595bc00 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85738600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec707000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597838c r4:85978000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597838c r4:85526200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593b000 r8:8552622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85526200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526200 r8:8027f5e8 r7:ec9d1e60 r6:85532a00 r5:8593b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85240340 INFO: task kworker/0:499:6132 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c44f6000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:6133 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:8593ec00 r4:8593ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r9:83018205 r8:8593ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:85a5938c r4:85a59000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/1:990:6133 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85828000 r8:85532bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532b80 r8:8027f5e8 r7:ec9dde60 r6:85532c80 r5:85828000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8553cd40 INFO: task kworker/1:991:6135 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c4a5c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:992:6137 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:992 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:85828c00 r4:00000000 r4:00000000 r5:85a59b8c r4:85a59800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a59b8c r4:85532c00 r4:85532c00 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85829800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3b2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec72b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a58f8c r4:85a58c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a58f8c r4:85532d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85829800 r8:85532d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532d00 r8:8027f5e8 r7:ecb95e60 r6:85532e80 r5:85829800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b100 INFO: task kworker/1:993:6139 is blocked on a mutex likely owned by task kworker/1:153:3802. Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:6141 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:6141 tgid:6141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecba1d84 r8:00000002 r7:60000113 r6:ecba1d8c r5:8582b000 r4:8582b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582b000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85a59f8c r4:85a59c00 r10:61c88647 r9:8582b000 r8:85532e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8582bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5a78c r4:85a5a400 r10:61c88647 r9:8582bc00 r8:85532f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c546b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85a5a38c r4:85a5a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecba5fb0 to 0xecba5ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:997:6147 blocked for more than 477 seconds. r4:85aabc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5ab8c r4:85a5a800 r10:61c88647 r9:85aabc00 r8:85a7a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 task:kworker/1:998 state:D stack:0 pid:6150 tgid:6150 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85a4bf8c r4:85a4bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4bf8c r4:85a7a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aad400 r8:85a7a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a200 r8:8027f5e8 r7:ecba5e60 r6:85526280 r5:85aad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b840 INFO: task kworker/1:998:6150 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c5c4a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:999:6151 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85a5af8c r4:85a5ac00 r7:ddde2d80 r6:83018200 r5:85a5af8c r4:85a7a180 r10:00000000 r9:85a7a180 r8:8027f5e8 r7:ecbb1e60 r6:85526380 r5:85aac800 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5b38c r4:85a5b000 r10:61c88647 r9:85aa9800 r8:85a7a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3bc00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c633b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1001:6155 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1001 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecbc5d84 r8:00000002 r7:60000113 r6:ecbc5d8c r5:85aa8000 r4:85aa8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85a5b78c r4:85a5b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5b78c r4:85a7a380 r4:85a7a380 r4:84b3bd40 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:1002:6157 blocked for more than 477 seconds. r4:85aaec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3be80 r5:85a5bb8c r4:85a5b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a7a400 r8:8027f5e8 r7:ecbb1e60 r6:85526500 r5:85aaec00 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec57b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5bf8c r4:85a5bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5bf8c r4:85a7a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aae000 r8:85a7a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a480 r8:8027f5e8 r7:ecbb1e60 r6:85526580 r5:85aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b080 INFO: task kworker/1:1003:6159 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c69d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a7a500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: c6f69000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec623000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5c38c r4:85a5c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5c38c r4:85a7a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85820c00 r8:85a7a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a580 r8:8027f5e8 r7:ecbd9e60 r6:85526680 r5:85820c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85908080 INFO: task kworker/1:1005:6164 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c75c2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:85821800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5cb8c r4:85a5c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:846ded80 r4:00000001 r4:84a7de40 task:kworker/1:1007 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5d78c r4:85a5d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5d78c r4:85a7a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85822400 r8:85a7a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a680 r8:8027f5e8 r7:ecbe9e60 r6:85526700 r5:85822400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85908440 INFO: task kworker/1:1007:6168 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c7a7c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85823000 r8:85a7a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred 5d20: c7a7c000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:846ded80 INFO: task kworker/1:1009:6172 blocked for more than 477 seconds. [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5d38c r4:85a5d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c7e87000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1010:6174 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1010 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc09d84 r8:00000002 r7:60000113 r6:ecc09d8c r5:85826000 r4:85826000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85826000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85908a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85826000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec819000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5db8c r4:85a5d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5db8c r4:85a7a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85826000 r8:85a7a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a800 r8:8027f5e8 r7:ecbf1e60 r6:85526900 r5:85826000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1011:6176 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1011 state:D stack:0 pid:6176 tgid:6176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc11d84 r8:00000002 r7:60000113 r6:ecc11d8c r5:85825400 r4:85825400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85825400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85908d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5e38c r4:85a5e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5e38c r4:85a7a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85825400 r8:85a7a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a880 r8:8027f5e8 r7:ecc09e60 r6:85526980 r5:85825400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85908980 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1012:6178 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1012 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc19d84 r8:00000002 r7:60000113 r6:ecc19d8c r5:85824800 r4:85824800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85824800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85a5df8c r4:85a7a900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85826c00 r4:829188d8 r4:00000000 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5e78c r4:85a5e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:1013:6180 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c89a2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1014:6182 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1014 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:847b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85a5eb8c r4:85a7aa00 r4:85a7aa00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: c89a2000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:6184 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:6184 tgid:6184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc31d84 r8:00000002 r7:60000113 r6:ecc31d8c r5:847b8000 r4:847b8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85908fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec881000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5ef8c r4:85a5ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5ef8c r4:85a7a300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b8000 r8:85a7a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a300 r8:8027f5e8 r7:ecc21e60 r6:85526b80 r5:847b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1016:6187 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1016 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc35d84 r8:00000002 r7:60000113 r6:ecc35d8c r5:847ba400 r4:847ba400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ba400 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5f38c r4:85a5f000 r4:85a7ab00 Exception stack(0xecc35fb0 to 0xecc35ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1017:6188 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1017 state:D stack:0 pid:6188 tgid:6188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc39d84 r8:00000002 r7:60000013 r6:ecc39d8c r5:847bb000 r4:847bb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f90c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5f78c r4:85a5f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5f78c r4:85a7ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bb000 r8:85a7abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7ab80 r8:8027f5e8 r7:ecc35e60 r6:85526c80 r5:847bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:1017:6188 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1018 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc41d84 r8:00000002 r7:60000013 r6:ecc41d8c r5:847bc800 r4:847bc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6038c r4:85a60000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6038c r4:85a7aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bc800 r8:85a7aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7aa80 r8:8027f5e8 r7:ecc39e60 r6:85526d00 r5:847bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f9080 INFO: task kworker/1:1018:6190 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c9b77000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ecbc9d84 r8:00000002 r7:60000013 r6:ecbc9d8c r5:8582e000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec8dd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a7ac00 9fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfb9d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8582d400 r8:85a7adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f93c0 INFO: task kworker/1:1021:6196 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ca188000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1022:6198 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1022 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc49d84 r8:00000002 r7:60000113 r6:ecc49d8c r5:8582a400 r4:8582a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a60b8c r4:85a60800 r7:ddde2d80 r6:83018200 r5:85a60b8c r4:85a7af00 Exception stack(0xecc49fb0 to 0xecc49ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1023:6200 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1023 state:D stack:0 pid:6200 tgid:6200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc51d84 r8:00000002 r7:60000113 r6:ecc51d8c r5:847bbc00 r4:847bbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f99c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6138c r4:85a61000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6138c r4:8598df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bbc00 r8:8598dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598df80 r8:8027f5e8 r7:ecc45e60 r6:85526d80 r5:847bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:854f9740 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1024:6202 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1024 state:D stack:0 pid:6202 tgid:6202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc59d84 r8:00000002 r7:60000113 r6:ecc59d8c r5:847bd400 r4:847bd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a60f8c r4:85a60c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a60f8c r4:8590d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bd400 r8:8590d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8590d000 r8:8027f5e8 r7:ecc45e60 r6:85526e00 r5:847bd400 r4:854f9a00 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8473cb8c r4:85af4100 Exception stack(0xecdb5fb0 to 0xecdb5ff8) r4:8566e040 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:6301 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecdc9d84 r8:00000002 r7:60000113 r6:ecdc9d8c r5:85280c00 r4:85280c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85280c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ee00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85280c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ff000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497db8c r4:8497d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497db8c r4:85af4000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280c00 r8:85af402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4000 r8:8027f5e8 r7:ec9d1e60 r6:85af4200 r5:85280c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc9fb0 to 0xecdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566e340 INFO: task kworker/0:501:6301 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cae9c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:502 state:D stack:0 pid:6323 tgid:6323 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85283c00 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 r5:00001000 r4:ec9b3000 r7:dddced80 r6:83018000 r5:85c3c38c r4:85af4180 Exception stack(0xecc4dfb0 to 0xecc4dff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 r4:84a7de40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3c78c r4:85c3c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3c78c r4:85af4300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85281800 r8:85af432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4300 r8:8027f5e8 r7:ecc4de60 r6:85af4400 r5:85281800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857710c0 INFO: task kworker/0:503:6347 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cb055000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:6364 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:6364 tgid:6364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eceddd84 r8:00000002 r7:60000113 r6:eceddd8c r5:85284800 r4:85284800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85284800 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecf3d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3cb8c r4:85c3c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3cb8c r4:85af4380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85284800 r8:85af43ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4380 r8:8027f5e8 r7:ecc4de60 r6:85af4480 r5:85284800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85771700 INFO: task kworker/0:504:6364 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cb4f0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r5:00001000 r4:ecfad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3cf8c r4:85c3cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3cf8c r4:85af4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280000 r8:85af452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4500 r8:8027f5e8 r7:ecc4de60 r6:85af4600 r5:85280000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:875303c0 INFO: task kworker/0:505:6384 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cb4f0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e05e5dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85833000 r7:00000000 r6:83018000 r5:00001000 r4:7f17f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3d38c r4:85c3d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3d38c r4:85af4580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833000 r8:85af45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4580 r8:8027f5e8 r7:ecc4de60 r6:8590d100 r5:85833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530780 INFO: task kworker/0:506:6390 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:e05e5dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ece99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87f17b8c r4:85af4700 Exception stack(0xecf99fb0 to 0xecf99ff8) r4:87530a00 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:e05e5dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed03dd84 r8:00000002 r7:60000113 r6:ed03dd8c r5:85286c00 r4:85286c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85286c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed03de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87ae3d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8872338c r4:88723000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8872338c r4:85af4680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85286c00 r8:85af46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4680 r8:8027f5e8 r7:ecc4de60 r6:85af4880 r5:85286c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed03dfb0 to 0xed03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530ec0 INFO: task kworker/0:508:6421 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cc11a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:6434 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:6434 tgid:6434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:ed015d84 r8:00000002 r7:60000113 r6:ed015d8c r5:85286000 r4:00000000 r4:00000000 r5:00001000 r4:ec681000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c3df8c r4:85af4800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6437 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecfcdd84 r8:00000002 r7:60000113 r6:ecfcdd8c r5:85282400 r4:85282400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85282400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfcde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87ae3100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85282400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:88725f8c r4:88725c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:88725f8c r4:85af4980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85282400 r8:85af49ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4980 r8:8027f5e8 r7:ecc4de60 r6:85af4a80 r5:85282400 r4:00000001 Exception stack(0xecfcdfb0 to 0xecfcdff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:6438 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:6438 tgid:6438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecf5dd84 r8:00000002 r7:60000113 r6:ecf5dd8c r5:85285400 r4:85285400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85285400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85285400 r7:00000000 r6:83018000 r5:00001000 r4:7f295000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbfd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3fb8c r4:85c3f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3fb8c r4:85af4a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85285400 r8:85af4a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4a00 r8:8027f5e8 r7:ecfcde60 r6:85af4b00 r5:85285400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf5dfb0 to 0xecf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530180 INFO: task kworker/0:511:6438 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ccf7d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:6445 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecf79d84 r8:00000002 r7:60000113 r6:ecf79d8c r5:85913000 r4:85913000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85913000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed0d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:84849800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:514 state:D stack:0 pid:6480 tgid:6480 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed0e7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85af4d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4d00 r8:8027f5e8 r7:ecf5de60 r6:85af4e80 r5:84848c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed091fb0 to 0xed091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564abc0 INFO: task kworker/0:514:6480 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cd48e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:6482 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:6482 tgid:6482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecfc9d84 r8:00000002 r7:60000113 r6:ecfc9d8c r5:8484a400 r4:8484a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb1dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85af4e00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8484b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:517:6491 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r4:8484c800 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8484c800 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf63000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3ff8c r4:85c3fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3ff8c r4:85526f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484c800 r8:85526f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85526f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526f00 r8:8027f5e8 r7:ecf5de60 r6:87aea000 r5:8484c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed10dfb0 to 0xed10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a900 INFO: task kworker/0:517:6491 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cdd3f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed135e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:519:6556 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:6556 tgid:6556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed101d84 r8:00000002 r7:60000113 r6:ed101d8c r5:8484e000 r4:8484e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed101e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8484e000 r7:00000000 r6:83018000 r5:00001000 r4:7f285000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473e78c r4:8473e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473e78c r4:87aea100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484e000 r8:87aea12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea100 r8:8027f5e8 r7:ecf5de60 r6:87aea280 r5:8484e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed101fb0 to 0xed101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f2e40 INFO: task kworker/0:519:6556 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ce693000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed2e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8473ef8c r4:87aea200 Exception stack(0xed2b9fb0 to 0xed2b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f2c40 INFO: task kworker/0:520:6558 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ce693000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:521:6561 blocked for more than 477 seconds. r4:8484bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8484bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f29b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed051000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473df8c r4:8473dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473df8c r4:87aea380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484bc00 r8:87aea3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea380 r8:8027f5e8 r7:ecf5de60 r6:87aea480 r5:8484bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f27c0 INFO: task kworker/0:521:6561 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ce693000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecd81000 r5:87ee078c r4:87ee0400 r4:87aea400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:847bec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d02c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f295000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec537000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bc38c r4:849bc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bc38c r4:87aea500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bec00 r8:87aea52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea500 r8:8027f5e8 r7:ed2f1e60 r6:87aea600 r5:847bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e5fb0 to 0xed1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f2700 INFO: task kworker/0:523:6573 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cec3f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:6650 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:6650 tgid:6650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed325d84 r8:00000002 r7:60000113 r6:ed325d8c r5:84851800 r4:84851800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84851800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c24c0 r5:00001000 r4:ed583000 r5:87ee138c r4:87ee1000 r7:dddced80 r6:83018000 r5:87ee138c r4:87aea680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed325fb0 to 0xed325ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6651 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6651 tgid:6651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed55dd84 r8:00000002 r7:60000113 r6:ed55dd8c r5:84850000 r4:84850000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84850000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed55de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d06c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84850000 r7:00000000 r6:83018000 r5:00001000 r4:7f325000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee0f8c r4:87ee0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee0f8c r4:87aea780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850000 r8:87aea7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea780 r8:8027f5e8 r7:ed325e60 r6:87aea800 r5:84850000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed55dfb0 to 0xed55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0340 INFO: task kworker/0:525:6651 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cf153000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6653 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6653 tgid:6653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed5b9d84 r8:00000002 r7:60000113 r6:ed5b9d8c r5:84853000 r4:84853000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84853000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7f335000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed373000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee0b8c r4:87ee0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee0b8c r4:87aea880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853000 r8:87aea8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea880 r8:8027f5e8 r7:ed325e60 r6:87aea900 r5:84853000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b9fb0 to 0xed5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0600 INFO: task kworker/0:526:6653 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cf719000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6661 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6661 tgid:6661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed5b5d84 r8:00000002 r7:60000113 r6:ed5b5d8c r5:84852400 r4:84852400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed611000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:87aea980 r8:8027f5e8 r7:ed325e60 r6:87aeaa80 r5:84852400 INFO: task kworker/0:527:6661 is blocked on a mutex likely owned by task kworker/1:153:3802. Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed3c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ee1f8c r4:87aeaa00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2b80 INFO: task kworker/0:528:6706 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cfe59000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:6708 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed5b1d84 r8:00000002 r7:60000113 r6:ed5b1d8c r5:84855400 r4:84855400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84855400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84855400 r7:00000000 r6:83018000 r5:00001000 r4:7f385000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee238c r4:87ee2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee238c r4:87aeab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84855400 r8:87aeab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aeab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aeab00 r8:8027f5e8 r7:ed5b5e60 r6:87aeac80 r5:84855400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b1fb0 to 0xed5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2dc0 INFO: task kworker/0:529:6708 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cfe59000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:6710 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:6710 tgid:6710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed66dd84 r8:00000002 r7:60000113 r6:ed66dd8c r5:84856000 r4:84856000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84856000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84856000 r7:00000000 r6:83018000 r5:00001000 r4:7f387000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee278c r4:87ee2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee278c r4:87aeac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:87aeac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aeac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aeac00 r8:8027f5e8 r7:ed5b5e60 r6:87aead80 r5:84856000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed66dfb0 to 0xed66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2f40 INFO: task kworker/0:530:6710 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cfe59000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:6711 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:6711 tgid:6711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed671d84 r8:00000002 r7:60000113 r6:ed671d8c r5:84853c00 r4:84853c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84853c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed671e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f389000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee1b8c r4:87ee1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee1b8c r4:87aead00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853c00 r8:87aead2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aead00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aead00 r8:8027f5e8 r7:ed5b5e60 r6:87aeae80 r5:84853c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed671fb0 to 0xed671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2a80 INFO: task kworker/0:531:6711 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0329000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:6713 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:6713 tgid:6713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed675d84 r8:00000002 r7:60000113 r6:ed675d8c r5:84850c00 r4:84850c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84850c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cf640 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed725000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee2f8c r4:87ee2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee2f8c r4:87aeae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850c00 r8:87aeae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aeae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aeae00 r8:8027f5e8 r7:ed5b5e60 r6:87aeaf80 r5:84850c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2dc0 INFO: task kworker/0:532:6713 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d07d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6723 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6723 tgid:6723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed679d84 r8:00000002 r7:60000113 r6:ed679d8c r5:84854800 r4:84854800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84854800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed679e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c0f7440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84854800 r7:00000000 r6:83018000 r5:00001000 r4:7f3b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ace978c r4:8ace9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8ace978c r4:8c1cc100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84854800 r8:8c1cc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc100 r8:8027f5e8 r7:ed675e60 r6:8c1cc080 r5:84854800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed679fb0 to 0xed679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf040 INFO: task kworker/0:533:6723 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0b1e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:6740 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:6740 tgid:6740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed699d84 r8:00000002 r7:60000113 r6:ed699d8c r5:85580000 r4:85580000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85580000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed699e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cf400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85580000 r7:00000000 r6:83018000 r5:00001000 r4:7f3b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee338c r4:87ee3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee338c r4:8c1cc000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85580000 r8:8c1cc02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc000 r8:8027f5e8 r7:ed675e60 r6:8c1cc180 r5:85580000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed699fb0 to 0xed699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf180 INFO: task kworker/0:534:6740 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0b1e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85580c00 r5:85580c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cf580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85580c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee378c r4:87ee3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee378c r4:8c1cc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85580c00 r8:8c1cc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc200 r8:8027f5e8 r7:ed675e60 r6:8c1cc300 r5:85580c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c5fb0 to 0xed6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf440 INFO: task kworker/0:535:6741 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0d55000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:6746 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:6746 tgid:6746 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85581800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:edcb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87eed38c r4:8c1cc280 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf240 INFO: task kworker/0:536:6746 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d11f5000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:6752 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:6752 tgid:6752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed701d84 r8:00000002 r7:60000113 r6:ed701d8c r5:85582400 r4:85582400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85582400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed701e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cffc0 r5:00001000 r4:ed605000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bd38c r4:849bd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bd38c r4:8c1cc380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8c1cc380 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8c1cf440 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:6766 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:6766 tgid:6766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed76dd84 r8:00000002 r7:60000113 r6:ed76dd8c r5:85584800 r4:85584800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85584800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed76de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cfa00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed681000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bcf8c r4:849bcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85584800 r8:8c1cc4ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed76dfb0 to 0xed76dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:539 state:D stack:0 pid:6768 tgid:6768 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed8ed000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc680 r8:8027f5e8 r7:ed6e1e60 r6:8c1cc780 r5:85583c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed67dfb0 to 0xed67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf940 INFO: task kworker/0:539:6768 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d1bee000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed779000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849bcb8c r4:849bc800 r10:61c88647 r9:85585400 r8:8c1cc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1d9380 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed965d84 r8:00000002 r7:60000113 r6:ed965d8c r5:85586c00 r4:85586c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed965e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846cba40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85586c00 r7:00000000 r6:83018000 r5:00001000 r4:7f44f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed791000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473ff8c r4:8473fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473ff8c r4:8c1cc880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586c00 r8:8c1cc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc880 r8:8027f5e8 r7:ed6e1e60 r6:8c1cc980 r5:85586c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed965fb0 to 0xed965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846cb6c0 INFO: task kworker/0:541:6837 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d1bee000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda25e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846befc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed693000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eec78c r4:87eec400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eec78c r4:8c1ccc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8c00 r8:8c1ccc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1ccc00 r8:8027f5e8 r7:ed6e1e60 r6:8c1ccc80 r5:855a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda25fb0 to 0xeda25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3640 INFO: task kworker/0:543:6877 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d261a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edad9e08 r5:00001000 r4:edcb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855ab000 r8:8c1ccbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1ccb80 r8:8027f5e8 r7:ed6e1e60 r6:8c1ccd00 r5:855ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedad9fb0 to 0xedad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85801300 INFO: task kworker/0:544:6904 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d261a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/0:545:6982 blocked for more than 478 seconds. r5:855ad400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcf5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a1740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f5bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8e03ef8c r4:8e03ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8e03ef8c r4:8c1ccd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ad400 r8:8c1ccdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccd80 r10:00000000 r9:8c1ccd80 r8:8027f5e8 r7:edad9e60 r6:8c1cce00 r5:855ad400 INFO: task kworker/0:545:6982 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855aec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede15e08 r5:00001000 r4:ede2b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8c1cce80 r8:8027f5e8 r7:edad9e60 r6:8c1ccf00 r5:855aec00 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:7060 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:7060 tgid:7060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ede21d84 r8:00000002 r7:60000113 r6:ede21d8c r5:855abc00 r4:855abc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855abc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90024080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef478c r4:87ef4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef478c r4:8c1ccf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:8c1ccfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:7067 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:7067 tgid:7067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b69840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf15000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cc38c r4:847cc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847cc38c r4:8c1cc600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ac800 r8:8c1cc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc600 r8:8027f5e8 r7:ede15e60 r6:8c1cc580 r5:855ac800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edee3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:549:7073 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:7092 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:7092 tgid:7092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:edeedd84 r8:00000002 r7:60000013 r6:edeedd8c r5:855aa400 r4:855aa400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855aa400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edeede08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed17d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedeedfb0 to 0xedeedff8) INFO: task kworker/0:550:7092 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:855a9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf2d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef838c r4:87ef8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef838c r4:85658200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:8565822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658200 r8:8027f5e8 r7:edeede60 r6:85658300 r5:855a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda1fb0 to 0xecda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:89b697c0 INFO: task kworker/0:551:7315 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d3863000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:846ded80 r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecf71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef878c r4:85658280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8000 r8:856582ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658280 r8:8027f5e8 r7:edeede60 r6:85658380 r5:855a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed231fb0 to 0xed231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:89b69d00 INFO: task kworker/0:552:7318 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d3863000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:553 state:D stack:0 pid:7320 tgid:7320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed24dd84 r8:00000002 r7:60000013 r6:ed24dd8c r5:85586000 r4:85586000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed24de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b69e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85586000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef8f8c r4:87ef8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef8f8c r4:85658400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586000 r8:8565842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658400 r8:8027f5e8 r7:edeede60 r6:85658480 r5:85586000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85ab0000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecffd000 r7:dddced80 r6:83018000 r5:87ef8b8c r4:85658500 r4:00000001 r4:89b69dc0 INFO: task kworker/0:554:7322 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d3ce8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Not tainted 6.15.0-syzkaller #0 r4:85ab0c00 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed021000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ef938c r4:85658580 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:7326 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:7326 tgid:7326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed259d84 r8:00000002 r7:60000013 r6:ed259d8c r5:85ab1800 r4:85ab1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed0cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:87ef978c r4:87ef9400 r10:61c88647 r9:85ab1800 r8:856586ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d448b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85ab2400 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed129000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ef9b8c r4:85658780 Exception stack(0xed0b1fb0 to 0xed0b1ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85ab3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 r5:00001000 r4:ed15d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85ab3000 r8:8565892c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed275e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85658980 r8:8027f5e8 r7:edeede60 r6:8590d700 r5:85832400 r4:857386c0 INFO: task kworker/0:559:7333 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d4b52000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:7334 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:7334 tgid:7334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85835400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed195000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:87efab8c r4:87efa800 r4:85658b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed331e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87efaf8c r4:87efac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87efaf8c r4:85658a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830c00 r8:85658aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658a80 r8:8027f5e8 r7:ed275e60 r6:8590d600 r5:85830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed331fb0 to 0xed331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9080 INFO: task kworker/0:561:7336 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5097000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed335e08 r5:00001000 r4:ed1c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85836000 r8:85658c2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:7340 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:7340 tgid:7340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed339d84 r8:00000002 r7:60000013 r6:ed339d8c r5:85830000 r4:85830000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85830000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed339e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87efb78c r4:87efb400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87efb78c r4:85658c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:85af9700 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed33de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87efbb8c r4:85658d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836c00 r8:85658d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658d00 r8:8027f5e8 r7:ed275e60 r6:8590d900 r5:85836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed33dfb0 to 0xed33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af93c0 INFO: task kworker/0:564:7342 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5bf9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed223000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed267000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752038c r4:87520000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752038c r4:85658e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833c00 r8:85658e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658e00 r8:8027f5e8 r7:ed275e60 r6:8590da00 r5:85833c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed345fb0 to 0xed345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9980 INFO: task kworker/0:566:7346 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5f80000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:7349 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:567 state:D stack:0 pid:7349 tgid:7349 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d5e08 r5:00001000 r4:ed293000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752078c r4:85658d80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d5fb0 to 0xed7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9900 INFO: task kworker/0:567:7349 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5f80000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r5:00001000 r4:ecf01000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:7351 tgid:7351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed839d84 r8:00000002 r7:60000013 r6:ed839d8c r5:85a3a400 r4:85a3a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a3a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed839e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af93c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f7cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87520f8c r4:87520c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87520f8c r4:85658f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a3a400 r8:85658f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658f00 r8:8027f5e8 r7:ed275e60 r6:8590db00 r5:85a3a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed839fb0 to 0xed839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9640 INFO: task kworker/0:568:7351 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7de40 task:kworker/0:569 state:D stack:0 pid:7353 tgid:7353 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a38000 r7:00000000 r6:83018000 r5:00001000 r4:7f7cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752178c r4:87521400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752178c r4:85658f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a38000 r8:85658fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658f80 r8:8027f5e8 r7:ed275e60 r6:8590db80 r5:85a38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed83dfb0 to 0xed83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9700 INFO: task kworker/0:569:7353 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d627b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:570 state:D stack:0 pid:7354 tgid:7354 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed3a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752238c r4:85658100 Exception stack(0xed875fb0 to 0xed875ff8) INFO: task kworker/0:570:7354 is blocked on a mutex likely owned by task kworker/1:153:3802. Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:7356 tgid:7356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed88dd84 r8:00000002 r7:60000013 r6:ed88dd8c r5:85a3bc00 r4:85a3bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a3bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed88de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d5480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed377000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87521b8c r4:87521800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87521b8c r4:9053c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a3bc00 r8:9053c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c100 r8:8027f5e8 r7:ed875e60 r6:8590dc80 r5:85a3bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed88dfb0 to 0xed88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a0c0 INFO: task kworker/0:571:7356 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d6b24000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85a3c800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85a3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7d3000 r5:00001000 r4:ed38f000 r5:8752138c r4:87521000 r4:9053c080 Exception stack(0xed899fb0 to 0xed899ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d54c0 INFO: task kworker/0:572:7358 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d6b24000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r10:829188dc r9:ed8a1d84 r8:00000002 r7:60000113 r6:ed8a1d8c r5:85a3d400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed3bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85a3d400 r8:9053c1ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:574:7362 blocked for more than 478 seconds. r4:85a3e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8b1e08 r5:00001000 r4:ed40b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed8b1fb0 to 0xed8b1ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:7364 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:7364 tgid:7364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed91dd84 r8:00000002 r7:60000013 r6:ed91dd8c r5:85a3ec00 r4:85a3ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a3ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed91de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87522b8c r4:87522800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87522b8c r4:9053c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a3ec00 r8:9053c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c200 r8:8027f5e8 r7:ed8b1e60 r6:8590de80 r5:85a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed91dfb0 to 0xed91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e31c0 INFO: task kworker/0:575:7364 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d72a2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8752378c r4:87523400 r7:dddced80 r6:83018000 r5:8752378c r4:9053c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a39800 r8:9053c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c300 r8:8027f5e8 r7:ed8b1e60 r6:8590df00 r5:85a39800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed929fb0 to 0xed929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3580 INFO: task kworker/0:576:7366 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d7580000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 r5:00001000 r4:ecf01000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed47b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:7372 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:7372 tgid:7372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed931d84 r8:00000002 r7:60000113 r6:ed931d8c r5:84a30000 r4:84a30000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a30000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed931e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3f40 r9:83018005 r8:84a30000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e1000 r5:00001000 r4:ed42b000 r10:61c88647 r9:84a30000 r8:9053c2ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05e5fb0 to 0xe05e5ff8) task:kworker/0:579 state:D stack:0 pid:7373 tgid:7373 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e39c0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87523f8c r4:9053c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30c00 r8:9053c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c480 r8:8027f5e8 r7:ed261e60 r6:8590d580 r5:84a30c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed941fb0 to 0xed941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3ec0 INFO: task kworker/0:579:7373 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d7e41000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a31800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed539000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:84a32400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a32400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed955e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a32400 r7:00000000 r6:83018000 r5:00001000 r4:7f7e7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752438c r4:87524000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752438c r4:9053c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a32400 r8:9053c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c580 r8:8027f5e8 r7:ed94de60 r6:8590d480 r5:84a32400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed955fb0 to 0xed955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3e80 INFO: task kworker/0:581:7377 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d82d2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:84a33000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed511000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed625000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87525b8c r4:87525800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87525b8c r4:9053c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a33c00 r8:9053c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c500 r8:8027f5e8 r7:ed94de60 r6:8590d380 r5:84a33c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed95dfb0 to 0xed95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530980 INFO: task kworker/0:583:7382 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d863b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:7383 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:7383 tgid:7383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed969d84 r8:00000002 r7:60000013 r6:ed969d8c r5:84a34800 r4:84a34800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a34800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed969e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a34800 r7:00000000 r6:83018000 r5:00001000 r4:7f7ed000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752538c r4:87525000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752538c r4:9053c600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:9053c600 Exception stack(0xed969fb0 to 0xed969ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d8b86000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:7385 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:7385 tgid:7385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed96dd84 r8:00000002 r7:60000013 r6:ed96dd8c r5:84a35400 r4:84a35400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a35400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed96de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a35400 r7:00000000 r6:83018000 r5:00001000 r4:7f7ef000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87524f8c r4:87524c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87524f8c r4:9053c700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a35400 r8:9053c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c700 r8:8027f5e8 r7:ed95de60 r6:8590d280 r5:84a35400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed96dfb0 to 0xed96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d91c0 INFO: task kworker/0:585:7385 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d8b86000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:7387 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:7387 tgid:7387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed971d84 r8:00000002 r7:60000013 r6:ed971d8c r5:84a36000 r4:84a36000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a36000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed971e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d96c0 r5:00001000 r4:ed5fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a36000 r8:9053c82c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r5:00001000 r4:ecf01000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ed979d84 r8:00000002 r7:60000113 r6:ed979d8c r5:85650000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed631000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752638c r4:9053c880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8c1d94c0 INFO: task kworker/0:587:7390 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d8fca000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:7392 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:7392 tgid:7392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed9c9d84 r8:00000002 r7:60000013 r6:ed9c9d8c r5:85651800 r4:85651800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85651800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85651800 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed63f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752678c r4:87526400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752678c r4:9053c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85651800 r8:9053c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c780 r8:8027f5e8 r7:ed979e60 r6:9053a100 r5:85651800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed9c9fb0 to 0xed9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d9280 INFO: task kworker/0:588:7392 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) r4:e05e5dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:589 state:D stack:0 pid:7393 tgid:7393 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ed65b000 r7:dddced80 r6:83018000 r5:87526b8c r4:9053c980 INFO: task kworker/0:589:7393 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:7396 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:7396 tgid:7396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda09d84 r8:00000002 r7:60000013 r6:eda09d8c r5:85653000 r4:85653000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85653000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda09e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed805000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85653000 r8:9053ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85650c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85650c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed669000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87526f8c r4:87526c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87526f8c r4:9053ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85650c00 r8:9053caac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeda0dfb0 to 0xeda0dff8) INFO: task kworker/0:591:7397 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752738c r4:9053c900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:7404 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:7404 tgid:7404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda05d84 r8:00000002 r7:60000013 r6:eda05d8c r5:85655400 r4:85655400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85655400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda05e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85655400 r7:00000000 r6:83018000 r5:00001000 r4:7f805000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed799000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752778c r4:87527400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752778c r4:9053cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85655400 r8:9053cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053cb00 r8:8027f5e8 r7:eda09e60 r6:9053a400 r5:85655400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda05fb0 to 0xeda05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d9e80 INFO: task kworker/0:593:7404 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:7406 tgid:7406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda19d84 r8:00000002 r7:60000113 r6:eda19d8c r5:85656c00 r4:85656c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85656c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85656c00 r7:00000000 r6:83018000 r5:00001000 r4:7f809000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87527b8c r4:87527800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87527b8c r4:9053cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85656c00 r8:9053ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053cc80 r8:8027f5e8 r7:eda09e60 r6:9053a380 r5:85656c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda19fb0 to 0xeda19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d9e80 INFO: task kworker/0:594:7406 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: da5da000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda29e08 r5:00001000 r4:ed7ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a36c00 r8:9053cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1d9dc0 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:7411 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:7411 tgid:7411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda31d84 r8:00000002 r7:60000113 r6:eda31d8c r5:85656000 r4:85656000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85656000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed869000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:87528b8c r4:87528800 r10:61c88647 r9:85656000 r8:9053cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d5180 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dab19000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed265d84 r8:00000002 r7:60000113 r6:ed265d8c r5:85ab6c00 r4:85ab6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532000 r5:00001000 r4:ed81d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed265fb0 to 0xed265ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed911000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:7418 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:7418 tgid:7418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda65d84 r8:00000002 r7:60000113 r6:eda65d8c r5:85ab5400 r4:85ab5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda65e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab5400 r7:00000000 r6:83018000 r5:00001000 r4:7f813000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87528f8c r4:87528c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87528f8c r4:9053cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab5400 r8:9053cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053cf80 r8:8027f5e8 r7:eda35e60 r6:9053cc00 r5:85ab5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda65fb0 to 0xeda65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:905324c0 INFO: task kworker/0:599:7418 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab3c00 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed8c9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f781000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b6000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87529f8c r4:87529c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87529f8c r4:90528000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab4800 r8:9052802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528000 r8:8027f5e8 r7:eda35e60 r6:90528200 r5:85ab4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda89fb0 to 0xeda89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:90532380 INFO: task kworker/0:601:7422 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: db9d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:8d578000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed961000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:603 state:D stack:0 pid:7426 tgid:7426 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda91e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8d578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f783000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752a78c r4:8752a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752a78c r4:90528300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d578c00 r8:9052832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528300 r8:8027f5e8 r7:eda89e60 r6:90528380 r5:8d578c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda91fb0 to 0xeda91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:90532780 INFO: task kworker/0:603:7426 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dbe12000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:7427 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecc8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752ab8c r4:90528400 Exception stack(0xedaa1fb0 to 0xedaa1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:90532a80 INFO: task kworker/0:604:7427 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dbe12000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:7430 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:7430 tgid:7430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed0b5d84 r8:00000002 r7:60000013 r6:ed0b5d8c r5:8d57a400 r4:8d57a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8d57a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b5e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecc13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752a38c r4:8752a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752a38c r4:90528500 r4:00000001 Exception stack(0xed0b5fb0 to 0xed0b5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:7432 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:7432 tgid:7432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed0bdd84 r8:00000002 r7:60000113 r6:ed0bdd8c r5:8d57b000 r4:8d57b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8d57b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2f2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8d57b000 r7:00000000 r6:83018000 r5:00001000 r4:7f78d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8d57b000 r8:9052862c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dca1f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:7433 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:7433 tgid:7433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed0b9d84 r8:00000002 r7:60000113 r6:ed0b9d8c r5:8d57bc00 r4:8d57bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8d57bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b9e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eccb1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8752b38c r4:8752b000 r10:61c88647 r9:8d57bc00 r8:905286ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:607:7433 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dca1f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:7435 blocked for more than 479 seconds. task:kworker/0:608 state:D stack:0 pid:7435 tgid:7435 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2f000 r5:00001000 r4:ecd0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8752af8c r4:8752ac00 r10:61c88647 r9:8d57c800 r8:905287ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:608:7435 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:85c39b8c r4:85c39800 r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8d57d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c5e08 r5:00001000 r4:ecd9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752bf8c r4:8752bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752bf8c r4:90528880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d57d400 r8:905288ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528880 r8:8027f5e8 r7:ed0bde60 r6:90528a00 r5:8d57d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c5fb0 to 0xed0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f240 INFO: task kworker/0:609:7438 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dcd88000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd49000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752bb8c r4:8752b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752bb8c r4:90528980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d57e000 r8:905289ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528980 r8:8027f5e8 r7:ed0c5e60 r6:90528a80 r5:8d57e000 Exception stack(0xed0fdfb0 to 0xed0fdff8) INFO: task kworker/0:610:7439 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8d57ec00 r4:00000000 r9:83018005 r8:8d57ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f793000 r5:00001000 r4:ecdb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee438c r4:92ee4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee438c r4:90528b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d57ec00 r8:90528b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528b00 r8:8027f5e8 r7:ed0c5e60 r6:90528c00 r5:8d57ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f400 INFO: task kworker/0:611:7441 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dd4b9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851d8000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f580 INFO: task kworker/0:612:7443 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dd4b9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:851d8c00 r4:829188d8 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2f680 r5:00001000 r4:ecdfb000 r5:92ee4b8c r4:92ee4800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed141e08 r5:00001000 r4:ed0cb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:614:7448 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:851da400 r4:829188d8 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2fc40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851da400 r7:00000000 r6:83018000 r5:00001000 r4:7f799000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee4f8c r4:92ee4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee4f8c r4:90528f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851da400 r8:90528f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528f00 r8:8027f5e8 r7:ed141e60 r6:90528f80 r5:851da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed151fb0 to 0xed151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f900 INFO: task kworker/0:615:7449 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dd827000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:7451 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:7451 tgid:7451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed165d84 r8:00000002 r7:60000013 r6:ed165d8c r5:851db000 r4:851db000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851db000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2fdc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851db000 r7:00000000 r6:83018000 r5:00001000 r4:7f79b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee538c r4:92ee5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee538c r4:87af7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851db000 r8:87af712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7100 r8:8027f5e8 r7:ed141e60 r6:87af7080 r5:851db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed165fb0 to 0xed165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2fb80 INFO: task kworker/0:616:7451 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddbc8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:7453 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:7453 tgid:7453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed169d84 r8:00000002 r7:60000013 r6:ed169d8c r5:851dbc00 r4:851dbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:851dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f79d000 r5:00001000 r4:ececb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee578c r4:92ee5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee578c r4:87af7000 r10:61c88647 r9:851dbc00 r8:87af702c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed169fb0 to 0xed169ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddbc8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:7455 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:7455 tgid:7455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed16dd84 r8:00000002 r7:60000113 r6:ed16dd8c r5:851dc800 r4:851dc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed16de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ef480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f79f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee5b8c r4:92ee5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee5b8c r4:87af7180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dc800 r8:87af71ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7180 r8:8027f5e8 r7:ed141e60 r6:87af7300 r5:851dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2fe80 INFO: task kworker/0:618:7455 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddf70000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:7457 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:7457 tgid:7457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:edac9d84 r8:00000002 r7:60000113 r6:edac9d8c r5:851dd400 r4:851dd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edac9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af4080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f7a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee5f8c r4:92ee5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee5f8c r4:87af7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dd400 r8:87af72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7280 r8:8027f5e8 r7:ed141e60 r6:87af7400 r5:851dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedac9fb0 to 0xedac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3180 INFO: task kworker/0:619:7457 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddf70000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c39b8c r4:85c39800 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecf7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851de000 r8:87af73ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edad1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af4480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecffb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee638c r4:92ee6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee638c r4:87af7480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dec00 r8:87af74ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7480 r8:8027f5e8 r7:ed141e60 r6:87af7580 r5:851dec00 r4:00000001