Extracting prog: 10m39.827508546s Minimizing prog: 1h15m34.597660995s Simplifying prog options: 0s Extracting C: 8m36.754858053s Simplifying C: 59m23.918364445s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002b80)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0, 0x0, 0x5}, 0x18) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002b80)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0, 0x0, 0x5}, 0x18) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h34m15.098432729s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df83dd84 r8:00000002 r7:60000013 r6:df83dd8c r5:83236000 r4:83236000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dc6480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed48b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d6578c r4:85d65400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d6578c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8b468000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84367f8c r4:84367c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84367f8c r4:830cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027f5e8 r7:df819d50 r6:830cd100 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8c0c6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:2:97 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:97 tgid:97 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:832f0c00 r4:832f0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583ed00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84509b8c r4:84509800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84509b8c r4:832bd680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0c00 r8:832bd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832bd680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd680 r8:8027f5e8 r7:df879e60 r6:832bd700 r5:832f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832bccc0 INFO: task kworker/1:2:97 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8c0c6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/0:2:3097 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:3097 tgid:3097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:8388e000 r4:8388e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dc6740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8388e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d6638c r4:85d66000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d6638c r4:847ce400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388e000 r8:847ce42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce400 r8:8027f5e8 r7:df845e60 r6:847cef80 r5:8388e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842fbd00 INFO: task kworker/0:2:3097 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8c943000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/0:5:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df885d84 r8:00000002 r7:60000113 r6:df885d8c r5:833a2400 r4:833a2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df885e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85140d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85228b8c r4:85228800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85228b8c r4:84858300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a2400 r8:8485832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84858300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84858300 r8:8027f5e8 r7:df845e60 r6:84858900 r5:833a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf885fb0 to 0xdf885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847999c0 INFO: task kworker/0:5:3117 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8cd3c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/0:8:3124 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:8330bc00 r4:8330bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515e040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8330bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df985000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850da38c r4:850da000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850da38c r4:847cec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330bc00 r8:847cec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cec00 r8:8027f5e8 r7:df885e60 r6:83b9ce80 r5:8330bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84799f00 INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8cfce000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:3:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83308c00 r4:83308c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83308c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85058f8c r4:85058c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85058f8c r4:83349880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308c00 r8:833498ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83349880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349880 r8:8027f5e8 r7:df879e60 r6:83349800 r5:83308c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:3:3125 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8d753000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:4:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:8330c800 r4:8330c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330c800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059f8c r4:85059c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85059f8c r4:83363700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330c800 r8:8336372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83363700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363700 r8:8027f5e8 r7:dfa09e60 r6:83363680 r5:8330c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:4:3127 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8d753000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:5:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:8330a400 r4:8330a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059b8c r4:85059800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85059b8c r4:8467fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330a400 r8:8467fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8467fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8467fb00 r8:8027f5e8 r7:dfa0de60 r6:848c1000 r5:8330a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:5:3128 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8da84000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:6:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:83252400 r4:83252400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83252400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85422380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83252400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85621f8c r4:85621c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85621f8c r4:848c1080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83252400 r8:848c10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1080 r8:8027f5e8 r7:dfa11e60 r6:848c1100 r5:83252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:6:3129 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8dd97000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83a91800 r4:83a91800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a91800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505978c r4:85059400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505978c r4:848c1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a91800 r8:848c11ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1180 r8:8027f5e8 r7:dfa15e60 r6:848c1200 r5:83a91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:7:3130 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8e29d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:83a93000 r4:83a93000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a93000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552cc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560df8c r4:8560dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560df8c r4:848c1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93000 r8:848c12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1280 r8:8027f5e8 r7:dfa15e60 r6:848c1300 r5:83a93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484f600 INFO: task kworker/1:8:3131 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8ebc6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3135 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa29d84 r8:00000002 r7:60000013 r6:dfa29d8c r5:841c0000 r4:841c0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f7f8c r4:851f7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f7f8c r4:847cef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c0000 r8:847cef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cef00 r8:8027f5e8 r7:df885e60 r6:83db2880 r5:841c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c100 INFO: task kworker/0:9:3135 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8f5d4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:841c4800 r4:841c4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85159500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522bb8c r4:8522b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522bb8c r4:830cd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c4800 r8:830cd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027f5e8 r7:df885e60 r6:830cd400 r5:841c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c400 INFO: task kworker/0:10:3137 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8f7a0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3139 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:841c6c00 r4:841c6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531f78c r4:8531f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531f78c r4:830cd280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c6c00 r8:830cd2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027f5e8 r7:dfa3de60 r6:830cd380 r5:841c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c380 INFO: task kworker/0:11:3139 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8fc07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:841c0c00 r4:841c0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489c600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439eb8c r4:8439e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439eb8c r4:832bd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c0c00 r8:832bd7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832bd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd780 r8:8027f5e8 r7:dfa49e60 r6:832bd600 r5:841c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c380 INFO: task kworker/0:12:3140 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8fd9b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83a94800 r4:83a94800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a94800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a94800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0895000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531cb8c r4:8531c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531cb8c r4:832bd180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a94800 r8:832bd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832bd180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd180 r8:8027f5e8 r7:dfa49e60 r6:848c1380 r5:83a94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c880 INFO: task kworker/0:13:3142 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8fd9b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3145 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83a90000 r4:83a90000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a90000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850070c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85334f8c r4:85334c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85334f8c r4:832a1980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a90000 r8:832a19ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1980 r8:8027f5e8 r7:dfa49e60 r6:848c1400 r5:83a90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c840 INFO: task kworker/0:14:3145 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 900a0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83a93c00 r4:83a93c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a93c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f5400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439f78c r4:8439f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439f78c r4:832a1900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93c00 r8:832a192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1900 r8:8027f5e8 r7:dfa7de60 r6:848c1480 r5:83a93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c840 INFO: task kworker/0:15:3146 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90444000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:832f0000 r4:832f0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85007e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533578c r4:85335400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533578c r4:832a1500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0000 r8:832a152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1500 r8:8027f5e8 r7:dfa7de60 r6:848c1500 r5:832f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c980 INFO: task kworker/0:16:3148 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90483000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:832f6000 r4:832f6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85007580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533538c r4:85335000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533538c r4:832a1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f6000 r8:832a14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1480 r8:8027f5e8 r7:dfa7de60 r6:848c1580 r5:832f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cd80 INFO: task kworker/0:17:3150 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90483000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3152 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:832f5400 r4:832f5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85334b8c r4:85334800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85334b8c r4:832bd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f5400 r8:832bd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832bd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd100 r8:8027f5e8 r7:dfa9de60 r6:848c1600 r5:832f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cbc0 INFO: task kworker/0:18:3152 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9068a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:832f1800 r4:832f1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550fe40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547c78c r4:8547c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547c78c r4:845d9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f1800 r8:845d9a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845d9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9a00 r8:8027f5e8 r7:dfa9de60 r6:848c1680 r5:832f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489ce80 INFO: task kworker/0:19:3155 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90922000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:832f3000 r4:832f3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548a38c r4:8548a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548a38c r4:845d9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f3000 r8:845d9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:845d9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9a80 r8:8027f5e8 r7:dfab5e60 r6:848c1700 r5:832f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cf00 INFO: task kworker/0:20:3156 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90d91000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3159 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83a96c00 r4:83a96c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a96c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500f380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb765000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548b38c r4:8548b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548b38c r4:83358080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a96c00 r8:833580ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83358080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358080 r8:8027f5e8 r7:dfab9e60 r6:848c1800 r5:83a96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd240 INFO: task kworker/0:21:3159 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90d91000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8407d400 r4:8407d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500fac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548bb8c r4:8548b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548bb8c r4:83358000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407d400 r8:8335802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83358000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358000 r8:8027f5e8 r7:dfac9e60 r6:848c1880 r5:8407d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd180 INFO: task kworker/0:22:3161 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9159f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:8407c800 r4:8407c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548bf8c r4:8548bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548bf8c r4:848d1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407c800 r8:848d102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1000 r8:8027f5e8 r7:dfad5e60 r6:848c1900 r5:8407c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd4c0 INFO: task kworker/0:23:3163 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9159f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:8407a400 r4:8407a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d5500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba27000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562278c r4:85622400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562278c r4:848d1080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407a400 r8:848d10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1080 r8:8027f5e8 r7:dfae5e60 r6:848c1980 r5:8407a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd580 INFO: task kworker/0:24:3165 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 91cfb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:84079800 r4:84079800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84079800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84079800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85891b8c r4:85891800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85891b8c r4:848c1a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84079800 r8:848c1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1a00 r8:8027f5e8 r7:dfa15e60 r6:848c1a80 r5:84079800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c2980 INFO: task kworker/1:9:3167 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 91cfb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:84078000 r4:84078000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84078000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d5600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84078000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85622b8c r4:85622800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85622b8c r4:848d1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84078000 r8:848d112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1100 r8:8027f5e8 r7:dfaede60 r6:848c1b00 r5:84078000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd900 INFO: task kworker/0:25:3170 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 91e97000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:8407bc00 r4:8407bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857de840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb687000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776f8c r4:85776c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85776f8c r4:848d1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407bc00 r8:848d11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1180 r8:8027f5e8 r7:dfaede60 r6:848c1b80 r5:8407bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd900 INFO: task kworker/0:26:3171 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 92329000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb11d84 r8:00000002 r7:60000013 r6:dfb11d8c r5:8407b000 r4:8407b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858438c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8407b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85731f8c r4:85731c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85731f8c r4:848c1c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407b000 r8:848c1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1c00 r8:8027f5e8 r7:dfa51e60 r6:848c1c80 r5:8407b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c2400 INFO: task kworker/1:10:3173 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 92581000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb15d84 r8:00000002 r7:60000013 r6:dfb15d8c r5:83316000 r4:83316000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83316000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cf8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83316000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d378c r4:857d3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d378c r4:848d1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83316000 r8:848d122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1200 r8:8027f5e8 r7:dfb09e60 r6:848c1d00 r5:83316000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cda00 INFO: task kworker/0:27:3175 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 92581000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:83312400 r4:83312400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83312400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f18c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83312400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562378c r4:85623400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562378c r4:848d1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83312400 r8:848d12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1280 r8:8027f5e8 r7:dfb15e60 r6:848c1d80 r5:83312400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cdbc0 INFO: task kworker/0:28:3176 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 929d8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:83314800 r4:83314800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83314800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85529c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83314800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df901000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d3b8c r4:857d3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d3b8c r4:848d1300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83314800 r8:848d132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1300 r8:8027f5e8 r7:dfb15e60 r6:848c1e00 r5:83314800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd900 INFO: task kworker/0:29:3179 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 929d8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:83a8ec00 r4:83a8ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85892f8c r4:85892c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85892f8c r4:848c1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8ec00 r8:848c1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1e80 r8:8027f5e8 r7:dfa51e60 r6:848c1f00 r5:83a8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf540 INFO: task kworker/1:11:3182 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9322f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:83a8b000 r4:83a8b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589278c r4:85892400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589278c r4:848c1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8b000 r8:848c17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1780 r8:8027f5e8 r7:dfa51e60 r6:848c3000 r5:83a8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf680 INFO: task kworker/1:12:3187 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9322f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:83243c00 r4:83243c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83243c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589078c r4:85890400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589078c r4:848c3080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83243c00 r8:848c30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3080 r8:8027f5e8 r7:dfa51e60 r6:848c3100 r5:83243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf680 INFO: task kworker/1:13:3188 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 936c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:83244800 r4:83244800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83244800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85892b8c r4:85892800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85892b8c r4:848c3180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83244800 r8:848c31ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3180 r8:8027f5e8 r7:dfa51e60 r6:848c3200 r5:83244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf900 INFO: task kworker/1:14:3191 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 936c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83865400 r4:83865400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83865400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a15ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83865400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7638c r4:85a76000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7638c r4:848d1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83865400 r8:848d14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1480 r8:8027f5e8 r7:dfb2de60 r6:848c3300 r5:83865400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cf80 INFO: task kworker/0:31:3193 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93b5a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb51d84 r8:00000002 r7:60000013 r6:dfb51d8c r5:84339800 r4:84339800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84339800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84339800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589238c r4:85892000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589238c r4:848c3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84339800 r8:848c33ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3380 r8:8027f5e8 r7:dfa51e60 r6:848c3400 r5:84339800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cfbc0 INFO: task kworker/1:15:3194 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93d07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb6dd84 r8:00000002 r7:60000013 r6:dfb6dd8c r5:841c3000 r4:841c3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85891f8c r4:85891c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85891f8c r4:848c3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c3000 r8:848c32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3280 r8:8027f5e8 r7:dfa51e60 r6:848d1500 r5:841c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cfbc0 INFO: task kworker/1:16:3195 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93d07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:8433d400 r4:8433d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d0f8c r4:857d0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d0f8c r4:848c3480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433d400 r8:848c34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3480 r8:8027f5e8 r7:dfa51e60 r6:848c3500 r5:8433d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cda80 INFO: task kworker/1:17:3198 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93d07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:8433ec00 r4:8433ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85890f8c r4:85890c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85890f8c r4:848c3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433ec00 r8:848c35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3580 r8:8027f5e8 r7:dfb65e60 r6:848c3600 r5:8433ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917300 INFO: task kworker/1:18:3200 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94481000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:8433bc00 r4:8433bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc47000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589178c r4:85891400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589178c r4:848c3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433bc00 r8:848c36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3680 r8:8027f5e8 r7:dfb7de60 r6:848c3700 r5:8433bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917300 INFO: task kworker/1:19:3202 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94824000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:8433b000 r4:8433b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cf340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589138c r4:85891000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589138c r4:848c3780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433b000 r8:848c37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3780 r8:8027f5e8 r7:dfb7de60 r6:848d1580 r5:8433b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917300 INFO: task kworker/1:20:3203 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94951000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:841f4800 r4:841f4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841f4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85893b8c r4:85893800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85893b8c r4:848c3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f4800 r8:848c382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3800 r8:8027f5e8 r7:dfb7de60 r6:848d1600 r5:841f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848912c0 INFO: task kworker/1:21:3206 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94951000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:841c1800 r4:841c1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d278c r4:857d2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d278c r4:848c3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c1800 r8:848c38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3880 r8:8027f5e8 r7:dfba9e60 r6:848d1680 r5:841c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891400 INFO: task kworker/1:22:3208 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 95502000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:841e6c00 r4:841e6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841e6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebec3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589338c r4:85893000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589338c r4:848c3900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841e6c00 r8:848c392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3900 r8:8027f5e8 r7:dfba9e60 r6:848c3980 r5:841e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891100 INFO: task kworker/1:23:3209 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 95b9a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:83ad3000 r4:83ad3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589378c r4:85893400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589378c r4:848c3a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad3000 r8:848c3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3a00 r8:8027f5e8 r7:dfba9e60 r6:848c3a80 r5:83ad3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891440 INFO: task kworker/1:24:3212 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 96337000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:841eb000 r4:841eb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841eb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85893f8c r4:85893c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85893f8c r4:848c3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841eb000 r8:848c3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3b00 r8:8027f5e8 r7:dfba9e60 r6:848c3b80 r5:841eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891680 INFO: task kworker/1:25:3214 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 96337000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3217 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:841ed400 r4:841ed400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ed400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589c38c r4:8589c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589c38c r4:848c3c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ed400 r8:848c3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3c00 r8:8027f5e8 r7:dfbc9e60 r6:848c3c80 r5:841ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848917c0 INFO: task kworker/1:26:3217 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 967b0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:841e9800 r4:841e9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841e9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450bf8c r4:8450bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450bf8c r4:848c3d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 96abd000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4100 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed563000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3224 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:841ebc00 r4:841ebc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ebc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:841ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:00001000 r4:ecaed000 r5:8589c78c r4:8589c400 r10:61c88647 r9:841ebc00 r8:848c3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) r4:84791100 Call trace: r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9734e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84be5080 Exception stack(0xe0635fb0 to 0xe0635ff8) Not tainted 6.15.0-syzkaller #0 r5:848f8000 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r5:00001000 r4:ecb0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589cb8c r4:8589c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589cb8c r4:84834080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8000 r8:848340ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834080 r8:8027f5e8 r7:dfbfde60 r6:84834100 r5:848f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791200 INFO: task kworker/1:30:3226 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3229 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:848f8c00 r4:848f8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb13000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589cf8c r4:8589cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589cf8c r4:84834200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8c00 r8:8483422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834200 r8:8027f5e8 r7:dfbfde60 r6:84834280 r5:848f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: Exception stack(0xe0635d28 to 0xe0635d70) r4:00000000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:848f9800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d040 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc11fb0 to 0xdfc11ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 97f4a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e01b1000 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r5:00001000 r4:ecb61000 r10:61c88647 r9:848fa400 r8:8483442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be4100 r10:829188dc r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:848fb000 r5:848fb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589db8c r4:8589d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589db8c r4:84834500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fb000 r8:8483452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834500 r8:8027f5e8 r7:dfc25e60 r6:84834580 r5:848fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791780 INFO: task kworker/1:34:3234 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 98f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 r5:8436438c r4:84364000 r4:84be5080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecb7f000 r7:ddde2d80 r6:83018200 r5:8589e78c r4:84834600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847919c0 INFO: task kworker/1:35:3236 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 98f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3238 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:848fc800 r4:848fc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ef8c r4:8589ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589ef8c r4:84834700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fc800 r8:8483472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834700 r8:8027f5e8 r7:dfc39e60 r6:84834780 r5:848fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791780 INFO: task kworker/1:36:3238 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 98f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:83ac6000 r4:83ac6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589eb8c r4:8589e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589eb8c r4:84834800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6000 r8:8483482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834800 r8:8027f5e8 r7:dfc41e60 r6:848d1780 r5:83ac6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791f40 INFO: task kworker/1:37:3240 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9932d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3241 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:83ac6c00 r4:83ac6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589fb8c r4:8589f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589fb8c r4:84834880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6c00 r8:848348ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834880 r8:8027f5e8 r7:dfc41e60 r6:848d1800 r5:83ac6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791f00 INFO: task kworker/1:38:3241 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9932d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3245 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:83ac0c00 r4:83ac0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f38c r4:8589f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589f38c r4:84834900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac0c00 r8:8483492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834900 r8:8027f5e8 r7:dfc65e60 r6:848d1880 r5:83ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b100 INFO: task kworker/1:39:3245 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 99d86000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3247 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:83ac3c00 r4:83ac3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f78c r4:8589f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589f78c r4:84834980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac3c00 r8:848349ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834980 r8:8027f5e8 r7:dfc65e60 r6:848d1900 r5:83ac3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b100 INFO: task kworker/1:40:3247 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9a116000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3248 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:841c6000 r4:841c6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592e78c r4:8592e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592e78c r4:84834a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c6000 r8:84834a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834a00 r8:8027f5e8 r7:dfc65e60 r6:848d1980 r5:841c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b1c0 INFO: task kworker/1:41:3248 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9a116000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3249 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:848fd400 r4:848fd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582da40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ff8c r4:8589fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589ff8c r4:84834a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:84834aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834a80 r8:8027f5e8 r7:dfc89e60 r6:84834b00 r5:848fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b140 INFO: task kworker/1:42:3249 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9accb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3252 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:848fec00 r4:848fec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582db40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592c38c r4:8592c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592c38c r4:84834b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fec00 r8:84834bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834b80 r8:8027f5e8 r7:dfc89e60 r6:84834c00 r5:848fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b340 INFO: task kworker/1:43:3252 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9accb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:848fe000 r4:848fe000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fe000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582dc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592c78c r4:8592c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592c78c r4:84834c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fe000 r8:84834cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834c80 r8:8027f5e8 r7:dfc89e60 r6:84834d00 r5:848fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b340 INFO: task kworker/1:44:3253 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9b385000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3257 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:84a28000 r4:84a28000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a28000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582dd80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a28000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592cb8c r4:8592c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592cb8c r4:84834d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28000 r8:84834dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834d80 r8:8027f5e8 r7:dfc89e60 r6:84834e00 r5:84a28000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b800 INFO: task kworker/1:45:3257 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9bb5b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:84a28c00 r4:84a28c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a28c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592eb8c r4:8592e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592eb8c r4:84834e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:84834eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834e80 r8:8027f5e8 r7:dfc89e60 r6:84834f00 r5:84a28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b800 INFO: task kworker/1:46:3258 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9bb5b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3259 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:84a29800 r4:84a29800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a29800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592e38c r4:8592e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592e38c r4:84834f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:84834fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834f80 r8:8027f5e8 r7:dfc89e60 r6:83ae0000 r5:84a29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bb80 INFO: task kworker/1:47:3259 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9c420000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3263 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:84a82400 r4:84a82400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a82400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592df8c r4:8592dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592df8c r4:83ae0080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a82400 r8:83ae00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0080 r8:8027f5e8 r7:dfc89e60 r6:848d1a00 r5:84a82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bb80 INFO: task kworker/1:48:3263 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9c998000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:84a83000 r4:84a83000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a83000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592db8c r4:8592d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592db8c r4:83ae0100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83000 r8:83ae012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0100 r8:8027f5e8 r7:dfab1e60 r6:848d1a80 r5:84a83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bcc0 INFO: task kworker/1:49:3264 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9cecf000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3265 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:84a83c00 r4:84a83c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a83c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ea340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d38c r4:8592d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592d38c r4:83ae0180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83c00 r8:83ae01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0180 r8:8027f5e8 r7:dfcbde60 r6:848d1b00 r5:84a83c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bcc0 INFO: task kworker/1:50:3265 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9cfdc000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3268 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:84a85400 r4:84a85400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a85400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d78c r4:8592d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592d78c r4:83ae0200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a85400 r8:83ae022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0200 r8:8027f5e8 r7:dfcc1e60 r6:848d1b80 r5:84a85400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bdc0 INFO: task kworker/1:51:3268 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d381000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:84a80000 r4:84a80000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a80000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592f38c r4:8592f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592f38c r4:83ae0280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80000 r8:83ae02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0280 r8:8027f5e8 r7:dfcc1e60 r6:848d1c00 r5:84a80000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848935c0 INFO: task kworker/1:52:3270 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d381000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3272 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:84a86000 r4:84a86000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a86000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592ef8c r4:8592ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592ef8c r4:83ae0300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86000 r8:83ae032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0300 r8:8027f5e8 r7:dfccde60 r6:848d1c80 r5:84a86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a200 INFO: task kworker/1:53:3272 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d696000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3274 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84a86c00 r4:84a86c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a86c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd0d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592fb8c r4:8592f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592fb8c r4:83ae0380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86c00 r8:83ae03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0380 r8:8027f5e8 r7:dfccde60 r6:848d1d00 r5:84a86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a180 INFO: task kworker/1:54:3274 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d922000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3276 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3276 tgid:3276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:84a80c00 r4:84a80c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a80c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592f78c r4:8592f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592f78c r4:83ae0400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80c00 r8:83ae042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0400 r8:8027f5e8 r7:dfcd5e60 r6:848d1d80 r5:84a80c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a340 INFO: task kworker/1:55:3276 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9dbe4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3277 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3277 tgid:3277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfce1d84 r8:00000002 r7:60000113 r6:dfce1d8c r5:84a81800 r4:84a81800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a81800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592ff8c r4:8592fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592ff8c r4:83ae0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a81800 r8:83ae04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0480 r8:8027f5e8 r7:dfcd5e60 r6:848d1e00 r5:84a81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a340 INFO: task kworker/1:56:3277 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9de60000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3279 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfce9d84 r8:00000002 r7:60000013 r6:dfce9d8c r5:849e8000 r4:849e8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:0000 <> t_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5571 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:849cec00 r4:849cec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85681b8c r4:85681800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85681b8c r4:850e8880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cec00 r8:850e88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8880 r8:8027f5e8 r7:ebba1e60 r6:851dc480 r5:849cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:851:5571 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dd313000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5572 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbadd84 r8:00000002 r7:60000013 r6:ebbadd8c r5:849cd400 r4:849cd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f08c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb401000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568138c r4:85681000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568138c r4:850e8900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cd400 r8:850e892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8900 r8:8027f5e8 r7:ebba9e60 r6:851dc500 r5:849cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbadfb0 to 0xebbadff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:5574 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb1d84 r8:00000002 r7:60000113 r6:ebbb1d8c r5:849cb000 r4:849cb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0a40 r5:00001000 r4:eb49f000 r10:61c88647 r9:849cb000 r8:850e89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8980 r8:8027f5e8 r7:ebba9e60 r6:851dc580 r5:849cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845f0780 INFO: task kworker/1:853:5574 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dd58d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5576 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5576 tgid:5576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb5d84 r8:00000002 r7:60000013 r6:ebbb5d8c r5:849cbc00 r4:849cbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85681f8c r4:85681c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85681f8c r4:850e8a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cbc00 r8:850e8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8a00 r8:8027f5e8 r7:ebba9e60 r6:851dc600 r5:849cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb5fb0 to 0xebbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845f0880 INFO: task kworker/1:854:5576 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dd930000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5579 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:847d8000 r4:847d8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb679000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568238c r4:85682000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:847d8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r9:83018205 r8:847d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:00001000 r4:eb877000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5582 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:847d9800 r4:847d9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568278c r4:85682400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568278c r4:850e8b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d9800 r8:850e8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8b80 r8:8027f5e8 r7:ebbbde60 r6:851dc780 r5:847d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd3c0 INFO: task kworker/1:857:5582 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: de368000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebbc5d84 r8:00000002 r7:60000013 r6:ebbc5d8c r5:847da400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e8c80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf6080 INFO: task kworker/1:858:5584 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: de5e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5587 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:847dbc00 r4:847dbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847dbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568378c r4:85683400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568378c r4:850e8c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dbc00 r8:850e8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8c00 r8:8027f5e8 r7:ebbbde60 r6:851dc880 r5:847dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf6340 INFO: task kworker/1:859:5587 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: de5e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:84be4100 r4:847dc800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf62c0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bf6340 r4:00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb8d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85683b8c r4:85683800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85683b8c r4:850e8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847de000 r8:850e8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8d80 r8:8027f5e8 r7:ebbcde60 r6:851dc980 r5:847de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbddfb0 to 0xebbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf6440 INFO: task kworker/1:861:5591 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dea23000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 r5:00001000 r4:ebd09000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Not tainted 6.15.0-syzkaller #0 r4:847db000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r5:00001000 r4:eb8ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847db000 r8:850e8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8436478c r4:84364400 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:855a0000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84a31b8c r4:84a31800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a3178c r4:84a31400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3178c r4:851dcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a2400 r8:851dcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcc00 r8:8027f5e8 r7:eba5de60 r6:851dcc80 r5:855a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:855a0c00 r4:00000000 r5:00001000 r4:ebd03000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:370:5603 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf1d84 r8:00000002 r7:60000113 r6:ebbf1d8c r5:855a3000 r4:855a3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb505000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a30f8c r4:84a30c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a30f8c r4:851dcd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3000 r8:851dcdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebbf1fb0 to 0xebbf1ff8) INFO: task kworker/0:370:5603 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r5:00001000 r4:eb54b000 r7:dddced80 r6:83018000 r5:855f438c r4:851dce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 9d60: 80230ad4 80239bb0 90070013 ffffffff [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:5607 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf5d84 r8:00000002 r7:60000113 r6:ebbf5d8c r5:855a4800 r4:855a4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0180 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f478c r4:855f4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f478c r4:851dcf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:851dcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcf80 r8:8027f5e8 r7:ebbc9e60 r6:84bee000 r5:855a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf5fb0 to 0xebbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae02c0 INFO: task kworker/0:372:5607 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 Exception stack(0xe0639d28 to 0xe0639d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:5610 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:373 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf9d84 r8:00000002 r7:60000113 r6:ebbf9d8c r5:855a5400 r4:855a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f4b8c r4:855f4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f4b8c r4:84bee080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a5400 r8:84bee0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee080 r8:8027f5e8 r7:ebbf5e60 r6:84bee100 r5:855a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) r4:84ae0300 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 r5:84364b8c r4:84364800 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) INFO: task kworker/0:374:5611 blocked for more than 476 seconds. r4:855a6000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb717000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee180 r8:8027f5e8 r7:ebbf9e60 r6:84bee200 r5:855a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbfdfb0 to 0xebbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0300 INFO: task kworker/0:374:5611 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 7ff6f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 Not tainted 6.15.0-syzkaller #0 Call trace: r5:855a6c00 r4:829188d8 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f4f8c r4:855f4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f4f8c r4:84bee280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a6c00 r8:84bee2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee280 r8:8027f5e8 r7:ebbfde60 r6:84bee300 r5:855a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc01fb0 to 0xebc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0300 INFO: task kworker/0:375:5613 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eb72f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f578c r4:855f5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f578c r4:84bee380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a1800 r8:84bee3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee380 r8:8027f5e8 r7:ebbfde60 r6:84bee400 r5:855a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc05fb0 to 0xebc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0640 INFO: task kworker/0:376:5615 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 807ce000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:5617 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc09d84 r8:00000002 r7:60000013 r6:ebc09d8c r5:84ac0000 r4:84ac0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f5f8c r4:855f5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f5f8c r4:84bee480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac0000 r8:84bee4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee480 r8:8027f5e8 r7:ebc05e60 r6:84bee500 r5:84ac0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0780 INFO: task kworker/0:377:5617 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 807ce000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:5620 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc0dd84 r8:00000002 r7:60000113 r6:ebc0dd8c r5:84ac0c00 r4:84ac0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb767000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f5b8c r4:855f5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f5b8c r4:84bee580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac0c00 r8:84bee5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee580 r8:8027f5e8 r7:ebc09e60 r6:84bee600 r5:84ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:e0639dc0 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:379 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ac1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f638c r4:855f6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f638c r4:84bee680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac1800 r8:84bee6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee680 r8:8027f5e8 r7:ebc09e60 r6:84bee700 r5:84ac1800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:84ac2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08 r9:83018005 r8:84ac2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:eb823000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f678c r4:855f6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f678c r4:84bee780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac2400 r8:84bee7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee780 r8:8027f5e8 r7:ebc11e60 r6:84bee800 r5:84ac2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc15fb0 to 0xebc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0c40 INFO: task kworker/0:380:5623 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8166e000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:5626 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc19d84 r8:00000002 r7:60000113 r6:ebc19d8c r5:84ac3000 r4:84ac3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:00001000 r4:eb843000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f6b8c r4:855f6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f6b8c r4:84bee880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3000 r8:84bee8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee880 r8:8027f5e8 r7:ebc15e60 r6:84bee900 r5:84ac3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc19fb0 to 0xebc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a79080 INFO: task kworker/0:381:5626 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:84ac3c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb861000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f6f8c r4:855f6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f6f8c r4:84bee980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3c00 r8:84bee9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee980 r8:8027f5e8 r7:ebc19e60 r6:84beea00 r5:84ac3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eb9ab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639d28 to 0xe0639d70) r5:00001000 r4:e01e9000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79300 r5:00001000 r4:eb919000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f738c r4:855f7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f738c r4:84beeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac5400 r8:84beebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84beeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beeb80 r8:8027f5e8 r7:ebc21e60 r6:84beec00 r5:84ac5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a79340 INFO: task kworker/0:384:5631 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be4200 r10:829188dc r9:ebc29d84 r8:00000002 r7:60000013 r6:ebc29d8c r5:84ac6c00 r5:00001000 r4:eb9d5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:5635 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc31d84 r8:00000002 r7:60000113 r6:ebc31d8c r5:855a8000 r4:855a8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb9bf000 r10:61c88647 r9:855a8000 r8:84beedac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc2dd84 r8:00000002 r7:60000013 r6:ebc2dd8c r5:855a8c00 r4:855a8c00 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:855a9800 r4:829188d8 r5:00001000 r4:eba21000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a79a00 INFO: task kworker/0:388:5639 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 82ae4000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r5:8564d400 r4:829188d8 r5:00001000 r4:eba09000 r7:dddced80 r6:83018000 r5:8560078c r4:848e9080 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85600f8c r4:85600c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 83198000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba43000 r4:848e9180 INFO: task kworker/0:391:5645 is blocked on a mutex likely owned by task kworker/1:290:3828. r5:00001000 r4:e01e9000 r4:00000001 INFO: task kworker/0:392:5647 blocked for more than 477 seconds. [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:392:5647 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 836db000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639fb0 to 0xe0639ff8) r4:84be4200 task:kworker/0:393 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc59d84 r8:00000002 r7:60000113 r6:ebc59d8c r5:8564ec00 r4:8564ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8564ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855341c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8564ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560178c r4:85601400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560178c r4:848e9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8564ec00 r8:848e92ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9280 r8:8027f5e8 r7:ebc55e60 r6:85533180 r5:8564ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855342c0 INFO: task kworker/0:393:5648 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:e0639dc0 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:394:5650 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:85646000 r4:85646000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85646000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85534340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85646000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85601b8c r4:85601800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85601b8c r4:848e9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85646000 r8:848e932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9300 r8:8027f5e8 r7:ebc55e60 r6:85533200 r5:85646000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:394:5650 is blocked on a mutex likely owned by task kworker/1:290:3828. Exception stack(0xe0639d28 to 0xe0639d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:5652 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85646c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r5:00001000 r4:eba7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:5654 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:5654 tgid:5654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:85650c00 r4:85650c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85650c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eba83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85650c00 r8:848e942c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:396:5654 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84909000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ebc7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85534540 INFO: task kworker/0:397:5656 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84909000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xe0639fb0 to 0xe0639ff8) task:kworker/0:398 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r5:00001000 r4:ebc95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560338c r4:85603000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560338c r4:848e9580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:848e95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9580 r8:8027f5e8 r7:ebc55e60 r6:848e9600 r5:855abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534780 INFO: task kworker/0:398:5659 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84fa9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be5180 r4:00000001 Exception stack(0xe0639fb0 to 0xe0639ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855ac800 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85602f8c r4:85602c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:848e9680 r10:00000000 r9:848e9680 r8:8027f5e8 r7:ebc79e60 r6:848e9700 r5:855ac800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84fa9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:5664 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc99d84 r8:00000002 r7:60000013 r6:ebc99d8c r5:855ad400 r4:855ad400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ad400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85534c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560378c r4:85603400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560378c r4:848e9780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ad400 r8:848e97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9780 r8:8027f5e8 r7:ebc79e60 r6:848e9800 r5:855ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534b00 INFO: task kworker/0:400:5664 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 852bd000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:5665 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcadd84 r8:00000002 r7:60000013 r6:ebcadd8c r5:855ae000 r4:855ae000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ae000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560c38c r4:8560c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560c38c r4:848e9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ae000 r8:848e98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9880 r8:8027f5e8 r7:ebc99e60 r6:848e9900 r5:855ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534bc0 INFO: task kworker/0:401:5665 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 859a8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:5667 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:5667 tgid:5667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcb5d84 r8:00000002 r7:60000013 r6:ebcb5d8c r5:855aa400 r4:855aa400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855aa400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85534dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85603b8c r4:85603800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603b8c r4:848e9980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aa400 r8:848e99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9980 r8:8027f5e8 r7:ebcade60 r6:848e9a00 r5:855aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb5fb0 to 0xebcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534e80 INFO: task kworker/0:402:5667 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 85da2000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5669 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcc1d84 r8:00000002 r7:60000013 r6:ebcc1d8c r5:847f0c00 r4:847f0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85603f8c r4:85603c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603f8c r4:848e9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f0c00 r8:848e9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9a80 r8:8027f5e8 r7:ebcade60 r6:848e9b00 r5:847f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc1fb0 to 0xebcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0e80 INFO: task kworker/0:403:5669 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 860e8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:5671 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcd1d84 r8:00000002 r7:60000013 r6:ebcd1d8c r5:847f0000 r4:847f0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560cb8c r4:8560c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560cb8c r4:848e9b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f0000 r8:848e9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9b80 r8:8027f5e8 r7:ebcade60 r6:848e9c00 r5:847f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd1fb0 to 0xebcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85508040 INFO: task kworker/0:404:5671 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 860e8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:5673 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:847f3000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcc7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 r5:00001000 r4:e01e9000 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560cf8c r4:8560cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560cf8c r4:848e9d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f3c00 r8:848e9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9d80 r8:8027f5e8 r7:ebcd1e60 r6:848e9e00 r5:847f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855084c0 INFO: task kworker/0:406:5675 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:5677 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcedd84 r8:00000002 r7:60000113 r6:ebcedd8c r5:847f4800 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebce5000 r5:8560d38c r4:8560d000 r10:00000000 r9:848e9e80 r8:8027f5e8 r7:ebcdde60 r6:848e9f00 r5:847f4800 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 INFO: task kworker/0:408:5679 blocked for more than 477 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf1e08 r5:00001000 r4:ebcf9000 r10:61c88647 r9:847f1800 r8:848e9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9f80 r8:8027f5e8 r7:ebcede60 r6:85512000 r5:847f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85508840 INFO: task kworker/0:408:5679 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 872f6000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:5681 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847f5400 r8:855120ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebd0dd84 r8:00000002 r7:60000113 r6:ebd0dd8c r5:847f2400 r4:847f2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb381000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560e38c r4:8560e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560e38c r4:85512180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f2400 r8:855121ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512180 r8:8027f5e8 r7:ebcf1e60 r6:85512200 r5:847f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd0dfb0 to 0xebd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85508700 INFO: task kworker/0:410:5683 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0639d28 to 0xe0639d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd1dd84 r8:00000002 r7:60000113 r6:ebd1dd8c r5:847f6000 r4:847f6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85689b8c r4:85689800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85689b8c r4:85533380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f6000 r8:855333ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533380 r8:8027f5e8 r7:ebbe1e60 r6:85512280 r5:847f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd1dfb0 to 0xebd1dff8) dfa0: 00000000 00000000 00000000 00000000 r4:8552cc80 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:e0639dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:866 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85533400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:e0639dc0 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:867:5689 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:867 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd19d84 r8:00000002 r7:60000113 r6:ebd19d8c r5:85650000 r4:85650000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85650000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552cb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85650000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85688f8c r4:85688c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85688f8c r4:85533500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85650000 r8:8553352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533500 r8:8027f5e8 r7:ebd1de60 r6:85533580 r5:85650000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd19fb0 to 0xebd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8552cf00 INFO: task kworker/1:867:5689 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 885ec000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:5691 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd25d84 r8:00000002 r7:60000113 r6:ebd25d8c r5:85653000 r4:85653000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85653000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85653000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568978c r4:85689400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8568978c r4:85512300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85653000 r8:8551232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512300 r8:8027f5e8 r7:ebd0de60 r6:85533600 r5:85653000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd25fb0 to 0xebd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85518100 INFO: task kworker/0:411:5691 is blocked on a mutex likely owned by task kworker/1:290:3828. Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85653c00 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c5c0 r5:00001000 r4:eb081000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebd29fb0 to 0xebd29ff8) r4:8552c7c0 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:869:5696 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:869 state:D stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85654800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd2de08 r5:00001000 r4:eb53b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85655400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85689f8c r4:85689c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85689f8c r4:85533880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85655400 r8:855338ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533880 r8:8027f5e8 r7:ebd2de60 r6:85533900 r5:85655400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd31fb0 to 0xebd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:871:5700 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:871 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd11d84 r8:00000002 r7:60000113 r6:ebd11d8c r5:85656000 r4:85656000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85656000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebdf9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85533980 r4:85508f40 r4:00000000 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:ebd39d84 r8:00000002 r7:60000013 r6:ebd39d8c r5:85656c00 r4:00000000 r5:00001000 r4:eb455000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5704 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:ebd41d84 r8:00000002 r7:60000013 r6:ebd41d8c r5:84ac6000 r4:00000000 r4:00000000 r5:00001000 r4:eb4bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8560eb8c r4:8560e800 r10:61c88647 r9:84ac6000 r8:8551242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85518800 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:e0639dc0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856a0c00 r4:829188d8 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ef8c r4:8560ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560ef8c r4:85512480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856a0c00 r8:855124ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512480 r8:8027f5e8 r7:ebd41e60 r6:85533b80 r5:856a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd49fb0 to 0xebd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855188c0 INFO: task kworker/0:414:5706 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 89c16000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e01e9000 r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb88d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:415:5709 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 89dd8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5710 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8560f38c r4:85512580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb707000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebd35fb0 to 0xebd35ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85518b00 INFO: task kworker/0:417:5711 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8a55b000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:847f6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd51e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85512700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512700 r8:8027f5e8 r7:ebd55e60 r6:85512780 r5:847f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd51fb0 to 0xebd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855180c0 INFO: task kworker/0:418:5715 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8a708000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebd3dd84 r8:00000002 r7:60000013 r6:ebd3dd8c r5:856b0000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ff8c r4:8560fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560ff8c r4:85512800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b0000 r8:8551282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512800 r8:8027f5e8 r7:ebd51e60 r6:85512880 r5:856b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd3dfb0 to 0xebd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855180c0 INFO: task kworker/0:419:5716 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:420 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856b0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550e1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85614b8c r4:85614800 r7:dddced80 r6:83018000 r5:85614b8c r4:85512900 Exception stack(0xebd61fb0 to 0xebd61ff8) INFO: task kworker/0:420:5718 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ebd71d84 r8:00000002 r7:60000113 r6:ebd71d8c r5:856b1800 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebbd7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5722 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5722 tgid:5722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd65d84 r8:00000002 r7:60000013 r6:ebd65d8c r5:856b2400 r4:856b2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550e3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85614f8c r4:85614c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85614f8c r4:85512b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b2400 r8:85512b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512b00 r8:8027f5e8 r7:ebd61e60 r6:85512b80 r5:856b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd65fb0 to 0xebd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550e300 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd79e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8561538c r4:85615000 r4:85512c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8bb8f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ebd85d84 r8:00000002 r7:60000013 r6:ebd85d8c r5:856b3c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebd8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8bb8f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebda1d84 r8:00000002 r7:60000013 r6:ebda1d8c r5:856a2400 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebd95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:426 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ebda7000 r5:85615f8c r4:85615c00 r4:85512e80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:5732 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:5732 tgid:5732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd99d84 r8:00000002 r7:60000113 r6:ebd99d8c r5:856b4800 r4:856b4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ec80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdbf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561678c r4:85616400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561678c r4:85512f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b4800 r8:85512f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512f00 r8:8027f5e8 r7:ebdb1e60 r6:85512f80 r5:856b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd99fb0 to 0xebd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550e8c0 INFO: task kworker/0:427:5732 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8c635000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:428:5733 blocked for more than 478 seconds. r4:856b5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd8de08 r5:00001000 r4:ebdad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebd8dfb0 to 0xebd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550e8c0 INFO: task kworker/0:428:5733 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8c635000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:429 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebdc5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 r5:84364b8c r4:84364800 r4:84be5180 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:430 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebdd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebdc9fb0 to 0xebdc9ff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5741 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebdd1d84 r8:00000002 r7:60000113 r6:ebdd1d8c r5:84ad0000 r4:84ad0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561738c r4:85617000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561738c r4:84bf4300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad0000 r8:84bf432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4300 r8:8027f5e8 r7:ebdc9e60 r6:84bf4380 r5:84ad0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84be4200 Workqueue: events bpf_prog_free_deferred r5:84ad0c00 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:ebdf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:432:5742 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8dd36000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:5743 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebdbdd84 r8:00000002 r7:60000013 r6:ebdbdd8c r5:84ad2400 r4:84ad2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebde7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561778c r4:85617400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561778c r4:84bf4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad2400 r8:84bf452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf5300 INFO: task kworker/0:433:5743 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8e2d9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0639dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebdfdd84 r8:00000002 r7:60000013 r6:ebdfdd8c r5:84ad3c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebded000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebdfdfb0 to 0xebdfdff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:e0639dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebe01d84 r8:00000002 r7:60000013 r6:ebe01d8c r5:84ad4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe01e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562038c r4:85620000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562038c r4:84bf4700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad4800 r8:84bf472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4700 r8:8027f5e8 r7:ebddde60 r6:84bf4780 r5:84ad4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe01fb0 to 0xebe01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf5600 INFO: task kworker/0:435:5747 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8e95d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568a78c r4:8568a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568a78c r4:85533e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad1800 r8:85533e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533e00 r8:8027f5e8 r7:ebd2de60 r6:84bf4800 r5:84ad1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe09fb0 to 0xebe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85531200 INFO: task kworker/1:872:5750 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8f139000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 r4:00000000 r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebe19d84 r8:00000002 r7:60000113 r6:ebe19d8c r5:84ad5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe11000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562078c r4:85620400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562078c r4:84bf4880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad5400 r8:84bf48ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ad6000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be4200 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe29d84 r8:00000002 r7:60000113 r6:ebe29d8c r5:84ad6c00 r4:84ad6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85620b8c r4:85620800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85620b8c r4:84bf4a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad6c00 r8:84bf4aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4200 Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85620f8c r4:85620c00 Exception stack(0xebe1dfb0 to 0xebe1dff8) Call trace: [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7dd000 r10:61c88647 r9:856b8000 r8:85533eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:e0639dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:874 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb5db000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568af8c r4:8568ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568af8c r4:85533f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b9800 r8:85533f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533f00 r8:8027f5e8 r7:ebc6de60 r6:84bf4d00 r5:856b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415380 INFO: task kworker/1:874:5766 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 906d3000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4200 r4:856bb000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb62b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:5769 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe51d84 r8:00000002 r7:60000113 r6:ebe51d8c r5:856b8c00 r4:856b8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85422140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562178c r4:85621400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562178c r4:84bf4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b8c00 r8:84bf4e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4e00 r8:8027f5e8 r7:ebde5e60 r6:84bf4e80 r5:856b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe51fb0 to 0xebe51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422400 INFO: task kworker/0:440:5769 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 90dbf000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:441:5771 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred r4:856bc800 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562238c r4:85622000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562238c r4:84bf4f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bc800 r8:84bf4f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4f00 r8:8027f5e8 r7:ebe51e60 r6:84bf4f80 r5:856bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe59fb0 to 0xebe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422980 INFO: task kworker/0:441:5771 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9107f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84be4200 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:856bd400 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:856bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 r5:00001000 r4:dfacb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85621b8c r4:85621800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85621b8c r4:85418000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bd400 r8:8541802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85418000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85418000 r8:8027f5e8 r7:ebe59e60 r6:85418080 r5:856bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe5dfb0 to 0xebe5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422980 INFO: task kworker/0:442:5772 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9160f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5773 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe61d84 r8:00000002 r7:60000113 r6:ebe61d8c r5:856ba400 r4:856ba400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ba400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854157c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb719000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568b78c r4:8568b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568b78c r4:856d2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ba400 r8:856d20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2080 r8:8027f5e8 r7:ebc6de60 r6:85418100 r5:856ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe61fb0 to 0xebe61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415580 INFO: task kworker/1:876:5773 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9160f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:877:5775 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:877 state:D stack:0 pid:5775 tgid:5775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe69d84 r8:00000002 r7:60000113 r6:ebe69d8c r5:856bec00 r4:856bec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb763000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568bb8c r4:8568b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568bb8c r4:856d2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bec00 r8:856d202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2000 r8:8027f5e8 r7:ebc6de60 r6:85418180 r5:856bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe69fb0 to 0xebe69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415740 INFO: task kworker/1:877:5775 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 919f9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:878:5777 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:878 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe71d84 r8:00000002 r7:60000113 r6:ebe71d8c r5:84ad8000 r4:84ad8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574178c r4:85741400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574178c r4:856d2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad8000 r8:856d212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2100 r8:8027f5e8 r7:ebc6de60 r6:85418200 r5:84ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe71fb0 to 0xebe71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415840 INFO: task kworker/1:878:5777 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 91d1d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:879:5779 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:879 state:D stack:0 pid:5779 tgid:5779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe79d84 r8:00000002 r7:60000113 r6:ebe79d8c r5:84ad9800 r4:84ad9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe79e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad9800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb819000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a31f8c r4:84a31c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a31f8c r4:856d2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad9800 r8:856d21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2180 r8:8027f5e8 r7:ebe71e60 r6:85418280 r5:84ad9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe79fb0 to 0xebe79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854159c0 INFO: task kworker/1:879:5779 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 91d1d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:5780 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe7dd84 r8:00000002 r7:60000013 r6:ebe7dd8c r5:84ada400 r4:84ada400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ada400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f1c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ada400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450bb8c r4:8450b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8450bb8c r4:85418300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ada400 r8:8541832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85418300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85418300 r8:8027f5e8 r7:ebe59e60 r6:85418380 r5:84ada400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe7dfb0 to 0xebe7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422c40 INFO: task kworker/0:443:5780 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 92496000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:880:5782 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:880 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe85d84 r8:00000002 r7:60000113 r6:ebe85d8c r5:84adbc00 r4:84adbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84adbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84adbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450b78c r4:8450b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450b78c r4:856d2200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84adbc00 r8:856d222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2200 r8:8027f5e8 r7:ebe71e60 r6:85418400 r5:84adbc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:881:5784 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:881 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84add400 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eb917000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84add400 r8:856d22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:882:5786 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:882 state:D stack:0 pid:5786 tgid:5786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe95d84 r8:00000002 r7:60000113 r6:ebe95d8c r5:84adc800 r4:84adc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84adc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84adc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574078c r4:85740400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574078c r4:856d2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84adc800 r8:856d232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2300 r8:8027f5e8 r7:ebe71e60 r6:85418500 r5:84adc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe95fb0 to 0xebe95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415fc0 INFO: task kworker/1:882:5786 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5788 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe9dd84 r8:00000002 r7:60000113 r6:ebe9dd8c r5:84adec00 r4:84adec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84adec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85422c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84adec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85740b8c r4:85740800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85740b8c r4:856d2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84adec00 r8:856d23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:856d2380 r8:8027f5e8 r7:ebe71e60 r6:85418580 r5:84adec00 INFO: task kworker/1:883:5788 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:884 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebea5fb0 to 0xebea5ff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:885:5792 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:885 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebeb1d84 r8:00000002 r7:60000113 r6:ebeb1d8c r5:856bbc00 r4:856bbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd4c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574138c r4:85741000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574138c r4:856d2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bbc00 r8:856d24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2480 r8:8027f5e8 r7:ebe71e60 r6:85418680 r5:856bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeb1fb0 to 0xebeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415f40 INFO: task kworker/1:885:5792 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9329d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:886:5796 blocked for more than 478 seconds. r4:856c8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebec9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8574278c r4:856d2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8550b100 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01e9000 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:887:5797 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:887 state:D stack:0 pid:5797 tgid:5797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebecdd84 r8:00000002 r7:60000013 r6:ebecdd8c r5:856c9800 r4:856c9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebecde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85741b8c r4:85741800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85741b8c r4:856d2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c9800 r8:856d25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2580 r8:8027f5e8 r7:ebec9e60 r6:85418780 r5:856c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebecdfb0 to 0xebecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550b2c0 INFO: task kworker/1:887:5797 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 93f50000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:888 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856d2600 r8:8027f5e8 r7:ebec9e60 r6:856d2680 r5:856a4800 INFO: task kworker/1:888:5798 is blocked on a mutex likely owned by task kworker/1:290:3828. Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 93f50000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5801 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebed1d84 r8:00000002 r7:60000113 r6:ebed1d8c r5:856a1800 r4:856a1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856a1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8574238c r4:856d2700 r10:00000000 r9:856d2700 r8:8027f5e8 r7:ebec9e60 r6:856d2780 r5:856a1800 INFO: task kworker/1:889:5801 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ebc87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85742f8c r4:856d2800 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:5805 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe39d84 r8:00000002 r7:60000113 r6:ebe39d8c r5:856a5400 r4:856a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe39e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85742b8c r4:85742800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85742b8c r4:856d2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856a5400 r8:856d292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2900 r8:8027f5e8 r7:ebed5e60 r6:856d2980 r5:856a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe39fb0 to 0xebe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550b880 INFO: task kworker/1:891:5805 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebedde08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ebca5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:856d2a00 r8:8027f5e8 r7:ebed5e60 r6:856d2a80 r5:85652400 INFO: task kworker/1:892:5807 is blocked on a mutex likely owned by task kworker/1:290:3828. Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r5:84364b8c r4:84364800 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) INFO: task kworker/1:893:5808 blocked for more than 478 seconds. r4:85658000 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ba00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85658000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc93000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574338c r4:85743000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574338c r4:856d2b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85658000 r8:856d2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2b00 r8:8027f5e8 r7:ebedde60 r6:856d2b80 r5:85658000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebee1fb0 to 0xebee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550bb00 INFO: task kworker/1:893:5808 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 94e48000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:894:5812 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:894 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebed9d84 r8:00000002 r7:60000113 r6:ebed9d8c r5:85658c00 r4:85658c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85658c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bcc0 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb1000 r5:85743b8c r4:85743800 r4:856d2c00 Exception stack(0xebed9fb0 to 0xebed9ff8) INFO: task kworker/1:894:5812 is blocked on a mutex likely owned by task kworker/1:290:3828. Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 94e48000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5813 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5813 tgid:5813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85659800 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85743f8c r4:856d2d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574438c r4:85744000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574438c r4:856d2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565a400 r8:856d2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2e00 r8:8027f5e8 r7:ebee9e60 r6:856d2e80 r5:8565a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeedfb0 to 0xebeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550be40 INFO: task kworker/1:896:5815 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 952c3000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8565bc00 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebce9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebef5fb0 to 0xebef5ff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639fb0 to 0xe0639ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ebefdd84 r8:00000002 r7:60000013 r6:ebefdd8c r5:8565c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebefde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855376c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8565c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85744f8c r4:85744c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85744f8c r4:85530000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565c800 r8:8553002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530000 r8:8027f5e8 r7:ebef5e60 r6:85530080 r5:8565c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebefdfb0 to 0xebefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855370c0 INFO: task kworker/1:898:5820 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 95839000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:5821 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:5821 tgid:5821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf01e08 r9:83018005 r8:8565d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:ebc5d000 r5:85622f8c r4:85622c00 r10:61c88647 r9:8565d400 r8:8541882c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5823 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd89d84 r8:00000002 r7:60000113 r6:ebd89d8c r5:8565ec00 r4:8565ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855374c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8565ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85744b8c r4:85744800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85744b8c r4:85530180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565ec00 r8:855301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530180 r8:8027f5e8 r7:ebefde60 r6:85530200 r5:8565ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd89fb0 to 0xebd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85537480 INFO: task kworker/1:899:5823 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9622d000 e01b3000 00000001 80239b98 7f641000 00000001 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8565e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:00001000 r4:eb067000 r7:ddde2d80 r6:83018200 r5:8574578c r4:85530280 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9622d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5827 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebef9d84 r8:00000002 r7:60000113 r6:ebef9d8c r5:85780000 r4:85780000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85780000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855378c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85780000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e024d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8574538c r4:85530380 Exception stack(0xebef9fb0 to 0xebef9ff8) INFO: task kworker/1:901:5827 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:902:5829 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:902 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebee5d84 r8:00000002 r7:60000113 r6:ebee5d8c r5:85780c00 r4:85780c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85780c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85780c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85745b8c r4:85745800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85745b8c r4:85530480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85780c00 r8:855304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530480 r8:8027f5e8 r7:ebf05e60 r6:85530500 r5:85780c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85781800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r5:00001000 r4:eb677000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85530580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:00000000 r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:904:5833 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:904 state:D stack:0 pid:5833 tgid:5833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf0dd84 r8:00000002 r7:60000013 r6:ebf0dd8c r5:85782400 r4:85782400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85782400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85782400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85745f8c r4:85745c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85745f8c r4:85530680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85782400 r8:855306ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530680 r8:8027f5e8 r7:ebf09e60 r6:85530700 r5:85782400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf0dfb0 to 0xebf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85537c00 INFO: task kworker/1:904:5833 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 967e6000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85783000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3bd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85530780 r8:8027f5e8 r7:ebf09e60 r6:85530800 r5:85783000 r4:85537c00 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5837 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf15d84 r8:00000002 r7:60000013 r6:ebf15d8c r5:85783c00 r4:85783c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85783c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84361040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574678c r4:85746400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574678c r4:85530880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85783c00 r8:855308ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530880 r8:8027f5e8 r7:ebf09e60 r6:85530900 r5:85783c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf15fb0 to 0xebf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361280 INFO: task kworker/1:906:5837 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 97174000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85784800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf19e08 r4:00000000 r5:00001000 r4:eb89f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 97813000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5841 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf21d84 r8:00000002 r7:60000013 r6:ebf21d8c r5:85785400 r4:85785400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85785400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf21e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84361300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85785400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:00001000 r4:eb6dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85746f8c r4:85746c00 r4:85530a80 Exception stack(0xebf21fb0 to 0xebf21ff8) r4:84361580 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 r5:84364b8c r4:84364800 r4:84be5180 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85786000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574778c r4:85747400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574778c r4:85530b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85786000 r8:85530bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530b80 r8:8027f5e8 r7:ebf19e60 r6:85530c00 r5:85786000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf1dfb0 to 0xebf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361400 INFO: task kworker/1:909:5843 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 98180000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5845 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebbd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:84be4200 task:kworker/1:911 state:D stack:0 pid:5847 tgid:5847 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf35e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85788000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85747f8c r4:85747c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85747f8c r4:85530d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788000 r8:85530dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530d80 r8:8027f5e8 r7:ebf2de60 r6:85530e00 r5:85788000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf35fb0 to 0xebf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:843616c0 INFO: task kworker/1:911:5847 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 98180000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5849 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:912 state:D stack:0 pid:5849 tgid:5849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf39d84 r8:00000002 r7:60000113 r6:ebf39d8c r5:85788c00 r4:85788c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf39e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84361a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd21000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575438c r4:85754000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575438c r4:85530e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788c00 r8:85530eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0639d28 to 0xe0639d70) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf3de08 r5:00001000 r4:ebd4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85530f80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 98776000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5853 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8578a400 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ebd5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85754b8c r4:8515c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578a400 r8:8515c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c080 r8:8027f5e8 r7:ebf3de60 r6:8515c100 r5:8578a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf41fb0 to 0xebf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361b40 INFO: task kworker/1:914:5853 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 992fd000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:5855 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:915 state:D stack:0 pid:5855 tgid:5855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf4dd84 r8:00000002 r7:60000013 r6:ebf4dd8c r5:856cc800 r4:856cc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754f8c r4:85754c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85754f8c r4:8515c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cc800 r8:8515c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c180 r8:8027f5e8 r7:ebf41e60 r6:85418880 r5:856cc800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:e0639dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:916:5858 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf55d84 r8:00000002 r7:60000013 r6:ebf55d8c r5:856ca400 r4:856ca400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ca400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd93000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575578c r4:85755400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575578c r4:8515c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ca400 r8:8515c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c200 r8:8027f5e8 r7:ebf4de60 r6:85418900 r5:856ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf55fb0 to 0xebf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361fc0 INFO: task kworker/1:916:5858 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99376000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639fb0 to 0xe0639ff8) r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5859 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:5859 tgid:5859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf59d84 r8:00000002 r7:60000113 r6:ebf59d8c r5:856cbc00 r4:856cbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575538c r4:85755000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575538c r4:8515c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cbc00 r8:8515c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c280 r8:8027f5e8 r7:ebf55e60 r6:85418980 r5:856cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf59fb0 to 0xebf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361fc0 INFO: task kworker/1:917:5859 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99713000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5861 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5861 tgid:5861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf5dd84 r8:00000002 r7:60000013 r6:ebf5dd8c r5:856ce000 r4:856ce000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ce000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdc1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575638c r4:85756000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575638c r4:8515c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ce000 r8:8515c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c300 r8:8027f5e8 r7:ebf55e60 r6:85418a00 r5:856ce000 Exception stack(0xebf5dfb0 to 0xebf5dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0639d28 to 0xe0639d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5863 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf61d84 r8:00000002 r7:60000013 r6:ebf61d8c r5:856cec00 r4:856cec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755b8c r4:85755800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85755b8c r4:8515c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cec00 r8:8515c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c380 r8:8027f5e8 r7:ebf5de60 r6:85418a80 r5:856cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf61fb0 to 0xebf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85010200 INFO: task kworker/1:919:5863 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99aa3000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:5864 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:920 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf65d84 r8:00000002 r7:60000013 r6:ebf65d8c r5:856cd400 r4:856cd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755f8c r4:85755c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85755f8c r4:8515c400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cd400 r8:8515c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c400 r8:8027f5e8 r7:ebf5de60 r6:85418b00 r5:856cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf65fb0 to 0xebf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850100c0 INFO: task kworker/1:920:5864 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99db1000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:5867 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf6dd84 r8:00000002 r7:60000113 r6:ebf6dd8c r5:856cb000 r4:856cb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf6de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575738c r4:85757000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575738c r4:8515c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cb000 r8:8515c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c480 r8:8027f5e8 r7:ebf5de60 r6:85418b80 r5:856cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf6dfb0 to 0xebf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850100c0 INFO: task kworker/1:921:5867 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9a140000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84364b8c r4:84364800 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) Not tainted 6.15.0-syzkaller #0 r4:8578b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf45e08 r9:83018205 r8:8578b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:00001000 r4:ebdcd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575678c r4:85756400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575678c r4:8515c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578b000 r8:8515c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c500 r8:8027f5e8 r7:ebf6de60 r6:8515c580 r5:8578b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf45fb0 to 0xebf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850100c0 INFO: task kworker/1:922:5868 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9a34e000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5871 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.